Autors: Tsochev, G. R., Trifonov, R. I., Nakov, O. N., Slavcho Manolov., Pavlova, G. V.
Title: Cyber security: Threats and Challenges
Keywords: cyber security , network security , threats , cyber-attacks

Abstract: Nowadays, computer and network system maintenance is just as important as their protection. Grow into the network systems that are posted on many different websites with payment function and this is seen as websites needed sensitive information and are important to any organization. Viruses represent one of the most successful ways to attack these systems and their use is inevitably part of the computer business worldwide. The use of identification and/or verification must be protected by the recommendable antivirus software, firewalls etc as well as by multiple other technologies created to protect the trinity of information security: confidentiality, integrity and availability. There is no specific standardized procedure for designing a secure network. Network security must be tailored to the current organization needs and achieve the appropriate protection required. In this article we examine and summarize the most popular and successful means of protections used by organizations.

References

    Issue

    2020 International Conference Automatics and Informatics (ICAI), 2020, Bulgaria, DOI 10.1109/ICAI50593.2020.9311369

    Цитирания (Citation/s):
    1. Abdulrahman A. Alghamdi, "Effective Penetration Testing Report Writing", Electrical Computer Communications and Mechatronics Engineering (ICECCME) 2021 International Conference on, pp. 1-5, 2021. - 2021 - в издания, индексирани в Scopus или Web of Science
    2. Holmström, A. (2021). Applying information security to the operational technology environment and the challenges it brings (Dissertation). - 2021 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    3. UR Rehman, Shafiq & Mahmud, Maqsood & Rahman, Atta & Haq, Ikram & Dr, Safdar,. (2021). Information Security in Business: A Bibliometric Analysis of the 100 Top Cited Articles. Library Philosophy and Practice. 2021. - 2021 - в издания, индексирани в Scopus или Web of Science
    4. XUAN, B. N., & LI, J. (2022). Malware Classification Method Based on Improved CNN. ACTA ELECTONICA SINICA, 1. - 2022 - в издания, индексирани в Scopus или Web of Science
    5. Coelho, M. F. (2022). Federated Learning aplicada em dispositivos com tecnologia Internet of Things (Master's thesis). - 2022 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    6. Xuan, B., Li, J., & Song, Y. (2022, October). BiTCN malware classification method based on multi-feature fusion. In 2022 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML) (pp. 359-364). IEEE. - 2022 - в издания, индексирани в Scopus или Web of Science
    7. Johansson, E., Larsson, M. O., & Pierce, P. Mikroföretags arbete med informationssäkerhet. - 2022 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    8. Xuan, Bona, Jin Li, and Yafei Song. "BiTCN-TAEfficientNet Malware Classification Approach Based on Sequence and RGB Fusion." Computers & Security (2024): 103734. - 2024 - в издания, индексирани в Scopus или Web of Science
    9. AL-Aamri, Abdullah Said, et al. "Machine Learning for APT Detection." Sustainability 15.18 (2023): 13820. - 2023 - в издания, индексирани в Scopus или Web of Science
    10. Wang, Shuai, et al. "Program Behavior Dynamic Trust Measurement and Evaluation Based on Data Analysis." Symmetry 16.2 (2024): 249. - 2024 - в издания, индексирани в Scopus или Web of Science
    11. Abdulkareem, Ademola, et al. "Experimental analysis of intrusion detection systems using machine learning algorithms and artificial neural networks." International Journal of Electrical and Computer Engineering (IJECE) 14.1 (2024): 983-992. - 2024 - в издания, индексирани в Scopus или Web of Science
    12. 轩勃娜, and 李进. "基于改进 CNN 的恶意软件分类方法." 电子学报 51.5 (2023): 1187. - 2023 - в издания, индексирани в Scopus или Web of Science
    13. Zonyfar, Candra, Jung-Been Lee, and Jeong-Dong Kim. "HCNN-LSTM: Hybrid Convolutional Neural Network with Long Short-Term Memory Integrated for Legitimate Web Prediction." Journal of Web Engineering 22.5 (2023): 757-782. - 2023 - в издания, индексирани в Scopus или Web of Science
    14. Taşkın, Gizemnur, and Mehmet Tahir Sandıkkaya. "Comparison of Security Frameworks for SMEs." 2023 14th International Conference on Electrical and Electronics Engineering (ELECO). IEEE, 2023. - 2023 - в издания, индексирани в Scopus или Web of Science
    15. Obi, Ogugua Chimezie, et al. "COMPREHENSIVE REVIEW ON CYBERSECURITY: MODERN THREATS AND ADVANCED DEFENSE STRATEGIES." Computer Science & IT Research Journal 5.2 (2024): 293-310. - 2024 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    16. Odujinrin, Adelaja Oyesanya. "Promoting Effective Cybersecurity Policy Compliance in Small Businesses." (2023). - 2023 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    17. Gonçalves, Daniel Filipe Ribeiro. Gestão de acesso privilegiado: abordagem com a solução CyberArk. Diss. ISPGAYA, 2023. - 2023 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science

    Вид: публикация в международен форум, публикация в реферирано издание, индексирана в Scopus