咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 5 篇 incident respons...
  • 1 篇 threat landscape
  • 1 篇 data breach
  • 1 篇 healthcare cyber...
  • 1 篇 regulations
  • 1 篇 end user computi...
  • 1 篇 computer emergen...
  • 1 篇 threat modeling
  • 1 篇 policy
  • 1 篇 threat intellige...
  • 1 篇 ransomware
  • 1 篇 cyber threat int...
  • 1 篇 compliance
  • 1 篇 cyber-physical s...
  • 1 篇 threat actors
  • 1 篇 artificial intel...
  • 1 篇 digital health s...
  • 1 篇 security orchest...
  • 1 篇 cyberattacks
  • 1 篇 cyber resilience

机构

  • 1 篇 the health infor...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 school of cybers...
  • 1 篇 school of comput...
  • 1 篇 key lab of medic...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 indian computer ...
  • 1 篇 school of comput...

作者

  • 1 篇 mehedi masud
  • 1 篇 ragha madhavi go...
  • 1 篇 olatunde abiona
  • 1 篇 ellis inglut
  • 1 篇 xinyue li
  • 1 篇 norjihan binti a...
  • 1 篇 sudhakar
  • 1 篇 vijay k. madiset...
  • 1 篇 ying he
  • 1 篇 aparna gadhi
  • 1 篇 adlyn adam teoh
  • 1 篇 mohammed a.alzai...
  • 1 篇 muneer ahmad
  • 1 篇 cunjin luo
  • 1 篇 hitendra chaudha...
  • 1 篇 nz jhanjhi
  • 1 篇 sushil kumar

语言

  • 5 篇 英文
检索条件"主题词=Incident Response"
5 条 记 录,以下是1-10 订阅
排序:
Organizational Data Breach:Building Conscious Care Behavior in incident response
收藏 引用
Computer Systems Science & Engineering 2022年 第2期40卷 505-515页
作者: Adlyn Adam Teoh Norjihan Binti Abdul Ghani Muneer Ahmad Nz Jhanjhi Mohammed A.Alzain Mehedi Masud Department of Information Systems Faculty of Computer Science&Information TechnologyUniversiti Malaya50603Kuala LumpurMalaysia School of Computer Science and Engineering SCE Taylor’s UniversitySubang Jaya47500Malaysia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident *** research study draws upon the literature in the areas of informati... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Malware incident response(IR) informed by cyber threat intelligence(CTI)
收藏 引用
Science China(Information Sciences) 2022年 第7期65卷 256-258页
作者: Ying HE Ellis INGLUT Cunjin LUO School of Computer Science and Informatics De Montfort University Key Lab of Medical Electrophysiology Ministry of Education The Health Informatics Group Institute of Cardiovascular Research Southwest Medical University School of Computer Science and Engineering Northeastern University
Dear editor, Security experts have been fighting against cybercriminals for many years and existing research shows that this battle will continue. Malicious software has no remorse when it targets different organizati... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cyber Resilience through Real-Time Threat Analysis in Information Security
收藏 引用
International Journal of Communications, Network and System Sciences 2024年 第4期17卷 51-67页
作者: Aparna Gadhi Ragha Madhavi Gondu Hitendra Chaudhary Olatunde Abiona Department of Computer Information Systems Indiana University Northwest Gary IN USA
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
ERAD: Enhanced Ransomware Attack Defense System for Healthcare Organizations
收藏 引用
Journal of Software Engineering and Applications 2024年 第5期17卷 270-296页
作者: Xinyue Li Vijay K. Madisetti School of Cybersecurity and Privacy Georgia Institute of Technology Atlanta Georgia USA
Digital integration within healthcare systems exacerbates their vulnerability to sophisticated ransomware threats, leading to severe operational disruptions and data breaches. Current defenses are typically categorize... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An emerging threat Fileless malware:a survey and research challenges
收藏 引用
Cybersecurity 2018年 第1期1卷 668-679页
作者: Sudhakar Sushil Kumar School of Computer&Systems Sciences Jawaharlal Nehru University110067New DelhiIndia Indian Computer Emergency response Team Ministry of Electronics&Information Technology110003New DelhiIndia
With the evolution of cybersecurity countermeasures,the threat landscape has also evolved,especially in malware from traditional file-based malware to sophisticated and multifarious fileless *** malware does not use t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论