Information sharing in cybersecurity: A review

A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …

RunMax: fake profile classification using novel nonlinear activation in CNN

P Wanda - Social Network Analysis and Mining, 2022 - Springer
Online social networks (OSN) are well-known platforms for exchanging various information.
However, one of the existing OSN challenges is the issue of fake accounts. The attacker …

[HTML][HTML] Threat modeling of cloud systems with ontological security pattern catalog

B Andrei - International Journal of Open Information Technologies, 2021 - cyberleninka.ru
This work considers challenges, related to the lack of methods of automatic threat modeling
and well-formed data sources of threats and countermeasures as well as techniques to …

[PDF][PDF] A systematic literature review on security indicators for open-source Enterprise resource planning software

JW Njuki, GM Muketha, JG Ndia - International Journal of Software …, 2022 - academia.edu
Open-source enterprise resource planning (ERP) software has become a preferred
alternative for modern organizations due to its affordable cost, availability and ease of …

Obsolescencia del conocimiento vs formación para el desarrollo sostenible: voces de protagonistas en el marco de la COVID 19

MS Ramírez-Montoya - Texto Livre, 2021 - SciELO Brasil
A lo largo de la historia se ha demostrado que el conocimiento ha sido un bien preciado
para el crecimiento personal, profesional y para el desarrollo científico y social. En época de …

[PDF][PDF] DeepSentiment: Finding Malicious Sentiment in Online Social Network based on Dynamic Deep Learning.

P Wanda, HJ Jie - IAENG International Journal of Computer …, 2019 - repositori.respati.ac.id
Current Online Social Network (OSN) needs real-time and adaptive security model. The
tremendous success of deep learning algorithms at computer vision tasks in recent years …

Understanding enterprise cybersecurity information sharing: a theoretical model and empirical analysis

JZ Zhang, L Goel, S Williamson - Enterprise Information Systems, 2024 - Taylor & Francis
This research employs an analytical modelling approach, complemented by empirical
analysis, to delve into enterprise cybersecurity information sharing strategies. Utilising a …

Attended-over distributed specificity for information extraction in cybersecurity

E Amjadian, N Prayogo, S McDonnell… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
Cybersecurity has become a critical necessity in aerospace, especially given the recent
prevalent utilization of cyberspace as well as computing infrastructure, tools, and platforms …

Knowledge and datasets as a resource for improving artificial intelligence

Š Balogh - Data Science and Intelligent Systems: Proceedings of …, 2021 - Springer
This work discusses and analyzes options that could be helpful for the research and
development of artificial intelligence. The work is based on analyzes and results of other …

Developers' Privacy Education: A game framework to stimulate secure coding behaviour

AH Alhazmi, MA Hameed… - 2022 IEEE Smartworld …, 2022 - ieeexplore.ieee.org
Software privacy provides the ability to limit data access to unauthorized parties. Privacy is
achieved through different means, such as implementing GDPR into software applications …