Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity DOI
Marcelo Mesquita Leal, Paul Musgrave

Contemporary Security Policy, Год журнала: 2023, Номер 44(3), С. 437 - 461

Опубликована: Май 25, 2023

Zero-day vulnerabilities are software and hardware flaws that unknown to computer vendors. As powerful means of carrying out cyber intrusions, such present a dilemma for governments. Actors develop or procure may retain them future use; alternatively, agencies possessing disclose the affected vendors so they can be patched, thereby denying not only adversaries but also themselves. Previous research has explored ethics implications this dilemma, no study investigated public opinion regarding zero-day exploits. We results from survey experiment testing whether conditions identified as important in literature influence respondents’ support disclosing stockpiling vulnerabilities. Our show respondents overwhelmingly disclosure, conclusion weakly by likelihood an adversary will independently discover vulnerability. findings suggest gap between preferences current U.S. policy.

Язык: Английский

Public Opinion and Cyberterrorism DOI Creative Commons
Ryan Shandler, Nadiya Kostyuk, Harry Oppenheimer

и другие.

Public Opinion Quarterly, Год журнала: 2023, Номер 87(1), С. 92 - 119

Опубликована: Фев. 1, 2023

Research into cyber-conflict, public opinion, and international security is burgeoning, yet the field suffers from an absence of conceptual agreement about key terms. For instance, every time a cyberattack takes place, debate erupts as to whether it constitutes cyberterrorism. This bears significant consequences, seeing ascription "terrorism" label enables application heavy-handed counterterrorism powers heightens level perceived threat among public. In light widespread disagreement in cyberspace, we assert that opinion plays heightened role understanding nature cyber threats. We construct typological framework illuminate attributes drive classification attack cyberterrorism, which test through ratings-based conjoint experiment United States, Kingdom, Israel (N = 21,238 observations). find (1) refrains labeling attacks by unknown actors or hacker collectives cyberterrorism; (2) classifies disseminate sensitive data terrorism greater extent even than physically explosive attacks. Importantly, uniform perspectives across three countries challenge foundational tenet relations scholarship divided views elites on foreign policy matters will be reflected study concludes providing definitive baseline support future research topic.

Язык: Английский

Процитировано

11

An intrusion detection model based on Convolutional Kolmogorov-Arnold Networks DOI Creative Commons
Zhen Wang, Anazida Zainal, Maheyzah Md Siraj

и другие.

Scientific Reports, Год журнала: 2025, Номер 15(1)

Опубликована: Янв. 14, 2025

The application of artificial neural networks (ANNs) can be found in numerous fields, including image and speech recognition, natural language processing, autonomous vehicles. As well, intrusion detection, the subject this paper, relies heavily on it. Different detection models have been constructed using ANNs. While ANNs are relatively mature to construct models, some challenges remain. Among most notorious these bloated caused by large number parameters, non-interpretability models. Our paper presents Convolutional Kolmogorov-Arnold Networks (CKANs), which designed overcome difficulties provide an interpretable accurate model. (KANs) developed from representation theorem. Meanwhile, CKAN incorporates a convolutional computational mechanism based KAN. model proposed is incorporating attention mechanisms into CKAN's logic. datasets CICIoT2023 CICIoMT2024 were used for training validation. From results evaluating performance indicators experiments, CKANs has attractive prospect. compared with other methods, predict much higher level accuracy significantly fewer parameters. However, it not superior terms memory usage, execution speed energy consumption.

Язык: Английский

Процитировано

0

Charting the scholarly waters of cyberterrorism and hacktivism research: A bibliometric analysis of academic output (2000–2020) DOI Creative Commons
Kevin Hosford

Information Security Journal A Global Perspective, Год журнала: 2025, Номер unknown, С. 1 - 27

Опубликована: Фев. 13, 2025

Язык: Английский

Процитировано

0

A comprehensive framework for cyber threat detection: leveraging AI, NLP, and malware analysis DOI
Nachaat Mohamed

International Journal of Information Technology, Год журнала: 2025, Номер unknown

Опубликована: Фев. 28, 2025

Язык: Английский

Процитировано

0

Cybercrime through the public lens: a longitudinal analysis DOI Creative Commons
Krishnashree Achuthan,

Sugandh Khobragade,

Robin M. Kowalski

и другие.

Humanities and Social Sciences Communications, Год журнала: 2025, Номер 12(1)

Опубликована: Март 1, 2025

Язык: Английский

Процитировано

0

Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques DOI
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam

и другие.

Communications in computer and information science, Год журнала: 2025, Номер unknown, С. 87 - 105

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Cyber Conflict & Domestic Audience Costs DOI
Ryan Shandler

International Interactions, Год журнала: 2025, Номер unknown, С. 1 - 25

Опубликована: Март 20, 2025

Язык: Английский

Процитировано

0

Managing cyber harm: a survey of challenges, practices, and opportunities DOI Creative Commons

Ekramul Islam,

Carsten Rudolph, Gillian Oliver

и другие.

Information Security Journal A Global Perspective, Год журнала: 2025, Номер unknown, С. 1 - 31

Опубликована: Март 30, 2025

Язык: Английский

Процитировано

0

The role of digital governance instruments and internet usage on government stability and regime durability DOI

Nasr G. Elbahnasawy,

Ahmad Reshad Osmani,

Timothy M. Shaughnessy

и другие.

Applied Economics, Год журнала: 2025, Номер unknown, С. 1 - 18

Опубликована: Март 30, 2025

Язык: Английский

Процитировано

0

The role of cybersecurity as a preventive measure in digital tourism and travel: a systematic literature review DOI Creative Commons
Lázaro Florido-Benítez

Deleted Journal, Год журнала: 2025, Номер 28(1)

Опубликована: Апрель 3, 2025

Abstract The purpose of this study is to show the growing concern about cybersecurity in tourism and travel research from 2000 August 7, 2024. methodology used adopted a systematic literature review approach based on PRISMA (Preferred Reporting Items for Systematic Reviews Meta-Analyses) using Web Science (WoS) database, as well implement VOSviewer software map most important themes related cybersecurity, tourism, keywords selected research. Findings current interest topic its relationship with disciplines by researchers, particularly beginning COVID-19 present. Indeed, growth ‘cybersecurity’ ‘tourism’ publications citations average annual up 18% 129%, respectively, 2020 2023. While ‘travel’ grew 8% 80%, respectively. Another finding was that keyword analysis revealed occurring words mainly were cybersecurity; impact; AI; security; management; case searches. Whereas searches adoption; attacks; challenges; consumer; cyberattacks; hotels; OTAs; smart cities; industry, among others. These findings studies carried out so far are tackling cybersecurity’s consequences impact activities cities, companies, consumers. Tourism companies need focus prevention, not only detection response cyberattacks. This know prevention protection tool industries because cyberattacks cyberthreats tourist destinations be taken seriously.

Язык: Английский

Процитировано

0