Cyber-attack scoring model based on the offensive cybersecurity framework

K Kim, FA Alfouzan, H Kim - Applied Sciences, 2021 - mdpi.com
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …

Computational system to classify cyber crime offenses using machine learning

R Ch, TR Gadekallu, MH Abidi, A Al-Ahmari - Sustainability, 2020 - mdpi.com
Particularly in the last decade, Internet usage has been growing rapidly. However, as the
Internet becomes a part of the day to day activities, cybercrime is also on the rise …

[HTML][HTML] Cyber-attack attributes

M Kadivar - Technology Innovation Management Review, 2014 - timreview.ca
Cyber-attacks threaten our ability to use the Internet safely, productively, and creatively
worldwide and are at the core of many security concerns. The concept of cyber-attacks …

A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions

H Ahmetoglu, R Das - Internet of Things, 2022 - Elsevier
Rapid developments in network technologies and the amount and scope of data transferred
on networks are increasing day by day. Depending on this situation, the density and …

[PDF][PDF] AVOIDIT: A cyber attack taxonomy

C Simmons, C Ellis, S Shiva… - University of Memphis …, 2009 - researchgate.net
Cyber attacks have greatly increased over the years, where the attackers have progressively
improved in devising attacks towards a specific target. To aid in identifying and defending …

A survey of cyber crimes

Y Zhang, Y Xiao, K Ghaboosi, J Zhang… - Security and …, 2012 - Wiley Online Library
With the advancement of computer and information technology, cyber crime is now
becoming one of the most significant challenges facing law enforcement organizations …

Cybercrimes: A proposed taxonomy and challenges

HS Brar, G Kumar - Journal of Computer Networks and …, 2018 - Wiley Online Library
Cybersecurity is one of the most important concepts of cyberworld which provides protection
to the cyberspace from various types of cybercrimes. This paper provides an updated survey …

Cyber kill chain based threat taxonomy and its application on cyber common operational picture

S Cho, I Han, H Jeong, J Kim, S Koo… - … Conference On Cyber …, 2018 - ieeexplore.ieee.org
Over a decade, intelligent and persistent forms of cyber threats have been damaging to the
organizations' cyber assets and missions. In this paper, we analyze current cyber kill chain …

A cyber attack evaluation methodology

K Pipyros, L Mitrou, D Gritzalis… - Proc. of the 13th …, 2014 - books.google.com
Following the identification on an international basis of cyberspace as a new 'domain of
warfare', it has become widely (though not fully) accepted that the traditional rules of …

[PDF][PDF] A survey on various cyber attacks and their classification.

M Uma, G Padmavathi - Int. J. Netw. Secur., 2013 - ijns.jalaxy.com.tw
The role of computers and the Internet in modern society is well recognized. Recent
developments in the fields of networking and cyberspace have greatly benefited mankind …