Computer Fraud & Security最新文献

筛选
英文 中文
Detecting message spoofing attacks on smart vehicles 检测智能车辆上的信息欺骗攻击
Computer Fraud & Security Pub Date : 2023-12-01 DOI: 10.12968/s1361-3723(23)70054-7
Mohamad Ibrahim, Nader Sohrabi Safa
{"title":"Detecting message spoofing attacks on smart vehicles","authors":"Mohamad Ibrahim, Nader Sohrabi Safa","doi":"10.12968/s1361-3723(23)70054-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70054-7","url":null,"abstract":"The rapid proliferation of smart vehicles, particularly connected vehicles, has led to a rise in cyberthreats. Ensuring the security of associated equipment has become a pressing concern. This article presents an analysis of various machine learning models for detecting message spoofing attacks on smart vehicles. These types of attacks can pose a significant risk to the safety and security of smart vehicles, with dangers such as accidents, hijacking incidents and other severe consequences. The findings indicate the potential of machine learning models in detecting message spoofing attacks. And the results underscore the need for robust security measures to prevent message spoofing attacks on smart vehicles.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"28 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139190510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Procurement's vital role in mitigating cyber security risks 采购在降低网络安全风险方面的重要作用
Computer Fraud & Security Pub Date : 2023-12-01 DOI: 10.12968/s1361-3723(23)70055-9
Conrad Snover
{"title":"Procurement's vital role in mitigating cyber security risks","authors":"Conrad Snover","doi":"10.12968/s1361-3723(23)70055-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70055-9","url":null,"abstract":"Organisations are heavily dependent on their supply chains and partners. But those third parties can also be the source of serious security vulnerabilities. When it comes to selecting partners and vendors, it's time to engage the services of a chief procurement officer, working alongside the IT department, to help ensure that your organisation's safety isn't undermined by your procurement activities.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"321 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139196260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Governing cyber security in the maritime industry 管理海运业的网络安全
Computer Fraud & Security Pub Date : 2023-12-01 DOI: 10.12968/s1361-3723(23)70056-0
Rossouw von Solms
{"title":"Governing cyber security in the maritime industry","authors":"Rossouw von Solms","doi":"10.12968/s1361-3723(23)70056-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70056-0","url":null,"abstract":"The maritime industry is critical for global trade and transportation. Owing to the continued increase in digitisation and connectivity, the industry faces various cyber security challenges. This paper explores the significance of governing cyber security in the maritime industry. By conducting an in-depth analysis of existing literature, industry reports, regulations, standards, etc, the paper aims to provide insights into the current state of cyber security governance in the maritime industry and makes recommendations for augmenting cyber resilience. This paper explores the significance of governing cyber security in the maritime industry.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139191314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From zero trust to total trust in financial services 金融服务从零信任到完全信任
Computer Fraud & Security Pub Date : 2023-11-01 DOI: 10.12968/s1361-3723(23)70051-1
Stefan Auerbach
{"title":"From zero trust to total trust in financial services","authors":"Stefan Auerbach","doi":"10.12968/s1361-3723(23)70051-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70051-1","url":null,"abstract":"Trust is critical in the financial services industry, but it's not something that organisations in this sector can take for granted. Gaining the trust of customers and partners starts with having systems that are highly secure. And the path to that goal might lie in a policy of zero trust.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"111 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139300425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A security analysis of SOHO embedded systems SOHO 嵌入式系统的安全分析
Computer Fraud & Security Pub Date : 2023-11-01 DOI: 10.12968/s1361-3723(23)70053-5
Wojciech Wodo, Michal Gancarczyk, Jakub Czyszczonik
{"title":"A security analysis of SOHO embedded systems","authors":"Wojciech Wodo, Michal Gancarczyk, Jakub Czyszczonik","doi":"10.12968/s1361-3723(23)70053-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70053-5","url":null,"abstract":"Due to many unusual constraints imposed on their design, embedded systems carry a large set of challenges related to feature implementation and security. Many systems extant today prove the extreme difficulty of designing a secure software architecture. Nevertheless, IoT systems are crucial in many environments ranging from large-scale, tightly secured commercial deployments to relatively unprotected home networks.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139299763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Redefining identity-first security with observability 用可观察性重新定义身份优先安全
Computer Fraud & Security Pub Date : 2023-11-01 DOI: 10.12968/s1361-3723(23)70052-3
Wade Ellery
{"title":"Redefining identity-first security with observability","authors":"Wade Ellery","doi":"10.12968/s1361-3723(23)70052-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70052-3","url":null,"abstract":"An identity-first approach to security, based on a zero-trust model, is being widely adopted as the concept of the network perimeter disappears. But many of these projects will fail and others will not achieve the full benefits available. These challenges can be avoided if the organisation is equipped to assess and manage identity data holistically through a capability known as identity observability.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139304597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信