• Cybersecurity
  • Ultime News
0
(0)

Latest Publications on Cybersecurity

This is our latest selection of worldwide publications on Cybersecurity, between many scientific online journals, classified and focused on cybersecurity, malware, phishing, firewall, encryption, zero-day exploit, denial of service, data breach and threat intelligence.

Tip: Further to this selection on Cybersecurity, you can search and filter our > publication database < by author, topic, keywords, date or journal.

Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector

On 2025-02-04 by Harjinder Singh Lallie, Andrew Thompson, Elzbieta Titis, Paul Stephens @MDPI

Abstract: Universities hold and process vast amounts of financial, user, and research data, which makes them prime targets for cybercriminals. In addition to the usual external threat actors, universities face a unique insider threat from students, who&amp;mdash;alongside staff&amp;mdash;may lack adequate cyber security training despite having access to various sensitive systems. This paper provides a focused assessment of the current cyber security threats facing UK universities, based on a compr[...]


AI summary: Universities are prime targets for cybercriminals due to vast amounts of sensitive data. Analysis of cyber security threats facing UK universities shows limited disclosure of attack details and reliance on third-party service providers. Despite a decline in SQL injection attacks, ransomware and phishing attacks remain prevalent, exacerbated by insider threats from students. Universities should refine their cyber security strategies by developing targeted policies, strengthening training, and implementing international standards.

Cyber Attacks, Cyber Security, Vulnerabilities, Universities, Insider Threats

Publication

Hypercomplex Numbers&mdash;A Tool for Enhanced Efficiency and Intelligence in Digital Signal Processing

On 2025-02-03 by Zlatka Valkova-Jarvis, Maria Nenova, Dimitriya Mihaylova @MDPI

Abstract: Mathematics is the wide-ranging solid foundation of the engineering sciences which ensures their progress by providing them with its unique toolkit of rules, methods, algorithms and numerical systems. In this paper, an overview of the numerical systems that have currently found an application in engineering science and practice is offered, while also mentioning those systems that still await full and comprehensive applicability, recognition, and acknowledgment. Two possible approaches for repres[...]


AI summary: Overview of numerical systems in engineering science, proposing approaches for hypercomplex numbers representation, importance of understanding hypercomplex numbers, potential of hypercomplex DSP.

hypercomplex numbers, digital signal processing, engineering sciences, numerical systems, information and communication technologies

Publication

Tailored Protocols for Periodic and Remote Control Traffic Patterns

On 2025-02-02 by Shunfang Hu, Yuanyuan Zhang, Yanru Guo, Yanru Chen, Liangyin Chen @MDPI

Abstract: IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. While AKA protocols for these applications have been extensively studied, achieving anonymity remains a challenge. AKA schemes using one-time pseudonyms face resynchronization issues after desynchronization attacks, and the high computational overhead of bilinear pairing and public key encryption limits [...]


AI summary: Tailored protocols address challenges in achieving anonymity for IoT-based applications, improving security features and reducing communication costs while minimizing computational overhead. Resynchronization issues and vulnerability to attacks are mitigated through PUAKA and RCAKA schemes, offering enhanced security and efficiency.

protocols, IoT-based applications, anonymous authentication, key agreement, periodic control pattern

Publication

Wazuh Security Event Response with Retrieval-Augmented-Generation-Driven Copilot

On 2025-01-31 by Ismail, Rahmat Kurnia, Farid Widyatama, Ilham Mirwansyah Wibawa, Zilmas Arjuna Brata, Ukasyah, Ghitha Afina Nelistiani, Howon Kim @MDPI

Abstract: The sophistication of cyberthreats demands more efficient and intelligent tools to support Security Operations Centers (SOCs) in managing and mitigating incidents. To address this, we developed the Security Event Response Copilot (SERC), a system designed to assist analysts in responding to and mitigating security breaches more effectively. SERC integrates two core components: (1) security event data extraction using Retrieval-Augmented Generation (RAG) methods, and (2) LLM-based incident respon[...]


AI summary: Cyberthreat sophistication requires efficient tools. SERC assists analysts in responding to breaches. Wazuh integrates RAG methods for data extraction. Combining threat intelligence frameworks with AI-driven models is essential.

Wazuh, Security Event Response, Retrieval-Augmented-Generation-Driven, Copilot, SIEM

Publication

Threat Analysis and Risk Assessment (TARA) Analysis of an Autonomous Emergency Braking (AEB) System

On 2025-01-29 by Umberto Della Monica, Kimberly-Annalena Munjal, Mark Paul Tamas, Biagio Boi, Christian Esposito, Rahamatullah Khondoker @MDPI

Abstract: To ensure security and stable quality, deeper cybersecurity evaluations are essential for the development of safety features and functionalities in vehicles. Among these, the Autonomous emergency braking (AEB) system is the most relevant. This research presents a comprehensive Threat analysis and risk assessment (TARA) of the AEB system, emphasizing the identification, validation, and mitigation of major cybersecurity threats and risks. We systematically examine potential attack vectors by utili[...]


AI summary: Comprehensive TARA analysis of AEB system, using STRIDE threat model. Assessment aligns with industry standards, identifies critical flaws, proposes corrective measures. Structured methodology for automotive cybersecurity risk mitigation. Safe implementation of AEB technology to improve vehicle security.

cybersecurity, risk assessment, autonomous emergency braking system, threat analysis, ISO/SAE 21434

Publication

Evidence from the Financial Sector of a Developing Country

On 2025-01-27 by Adeel Ali, Mahmood Shah, Monika Foster, Mansour Naser Alraja @MDPI

Abstract: Technological advancements have helped all sectors to evolve. This advancement has widened the cyberspace and attack surface, which has led to a drastic increase in cyberattacks. Cybersecurity solutions have also evolved. The advancement is relatively slower in developing countries. However, the financial sector in developing countries has shown resistance to cyberattacks. This paper investigates the reasons for this resistance. Despite using legacy systems, the banking sector in Pakistan has de[...]


AI summary: Evidence from the Financial Sector of a Developing Country shows resistance to cyberattacks in the banking sector of Pakistan, attributed to lower attack surface and opportunity cost of cyberattacks. The research advocates for the adoption of advanced technologies like AI and ML for cybersecurity in developing countries.

cybersecurity, financial sector, developing country, resistance, technological advancements

Publication

Quanto è stato utile questo post?

Cliccate su una stella per valutarla!

Valutazione media 0 / 5. Conteggio dei voti: 0

Nessun voto per ora! Sii il primo a valutare questo post.

Visto che hai trovato utile questo post...

Seguiteci sui social media!

Ci dispiace che questo post non sia stato utile per voi!

Miglioriamo questo post!

Ci dite come possiamo migliorare questo post?

STATE ASSUMENDO?
La meccanica combina software ed elettronica in prodotti di successo. Posso aiutare come Product Dev, R&D Manager o Project Manager?
Sviluppo efficace del prodotto

Disponibile con breve preavviso in Francia e in Svizzera.
Contatta l'autore su LinkedIn
Design-to-cost, ergonomia, volumi medio-alti, industrie regolamentate, CE e FDA, CAD, Solidworks, Lean Sigma Black Belt, ISO 13485 Medico Classe II e III

We are proud to highlight, sort and link to these publications. All the publications remain copyrighted of their respective authors & Editors.

Latest Posts

Latest News on Cybersecurity

0 (0) Quanto è stato utile questo post? Cliccate su una stella per valutarla! Invia la valutazione Valutazione media 0 /

Torna in alto