Managing Cybersecurity Threats and Increasing Organizational Resilience
Conflicts of Interest
References
- Alrobaian, S.; Alshahrani, S.; Almaieh, A. Cybersecurity awareness assessment among trainees of the technical and vocational training corporation. Big Data Cogn. Comput. 2023, 7, 73. [Google Scholar] [CrossRef]
- Alraizza, A.; Algarni, A. Ransomware detection using machine learning: A survey. Big Data Cogn. Comput. 2023, 7, 143. [Google Scholar] [CrossRef]
- Park, S.; Youm, H.-Y. Security and privacy threats and requirements for the centralized contact tracing systems in Korea. Big Data Cogn. Comput. 2022, 6, 143. [Google Scholar] [CrossRef]
- Leiva, M.A.; García, A.J.; Shakarian, P.; Simari, G.I. Argumentation-based query answering under uncertainty with application to cybersecurity. Big Data Cogn. Comput. 2022, 6, 91. [Google Scholar] [CrossRef]
- Chavarro, S.P.; Nespoli, P.; Díaz-López, D.; Roa, Y.N. On the way to automatic exploitation of vulnerabilities and validation of systems security through security chaos engineering. Big Data Cogn. Comput. 2023, 7, 1. [Google Scholar]
- Odarchenko, R.; Iavich, M.; Iashvili, G.; Fedushko, S.; Syerov, Y. Assessment of security KPIs for 5G network slices for special groups of subscribers. Big Data Cogn. Comput. 2023, 7, 169. [Google Scholar] [CrossRef]
- Lozano, M.A.; Llopis, I.P.; Domingo, M.E. Threat hunting architecture using a machine learning approach for critical infrastructure protection. Big Data Cogn. Comput. 2023, 7, 65. [Google Scholar] [CrossRef]
- Louk, M.H.L.; Tama, B.A. PSO-driven feature selection and hybrid ensemble for network anomaly detection. Big Data Cogn. Comput. 2022, 6, 137. [Google Scholar] [CrossRef]
- Abdulsattar, N.F.; Abedi, F.; Ghanimi, H.M.A.; Kumar, S.; Abbas, A.H.; Abosinnee, A.S.; Alkhayyat, A.; Hassan, M.H.; Abbas, F.H. Botnet detection employing a dilated convolutional autoencoder classifier with the aid of hybrid shark and bear smell optimization algorithm-based feature selection in FANETs. Big Data Cogn. Comput. 2022, 6, 112. [Google Scholar] [CrossRef]
- Park, K.; Youm, H.-Y. Proposal of decentralized P2P service model for transfer between blockchain-based heterogeneous cryptocurrencies and CBDCs. Big Data Cogn. Comput. 2022, 6, 159. [Google Scholar] [CrossRef]
- Trim, P.R.J.; Lee, Y.-I. Combing sociocultural intelligence with artificial intelligence to increase organizational cyber security provision through enhanced resilience. Big Data Cogn. Comput. 2022, 6, 110. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Trim, P.R.J.; Lee, Y.-I. Managing Cybersecurity Threats and Increasing Organizational Resilience. Big Data Cogn. Comput. 2023, 7, 177. https://doi.org/10.3390/bdcc7040177
Trim PRJ, Lee Y-I. Managing Cybersecurity Threats and Increasing Organizational Resilience. Big Data and Cognitive Computing. 2023; 7(4):177. https://doi.org/10.3390/bdcc7040177
Chicago/Turabian StyleTrim, Peter R. J., and Yang-Im Lee. 2023. "Managing Cybersecurity Threats and Increasing Organizational Resilience" Big Data and Cognitive Computing 7, no. 4: 177. https://doi.org/10.3390/bdcc7040177
APA StyleTrim, P. R. J., & Lee, Y. -I. (2023). Managing Cybersecurity Threats and Increasing Organizational Resilience. Big Data and Cognitive Computing, 7(4), 177. https://doi.org/10.3390/bdcc7040177