Cyber Technological Paradigms and Threat Landscape in India

被引:0
|
作者
Patil, Krutika [1 ]
机构
[1] MP IDSA, Cybersecur Ctr Excellence ICCOE, New Delhi, India
关键词
D O I
10.1080/09700161.2022.2081436
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
引用
收藏
页码:354 / 356
页数:3
相关论文
共 50 条
  • [41] CYBER THREAT MODELING FRAMEWORK
    Raposo de Melo, Renato Carvalho
    Albuquerque, Robson de Oliveira
    Lopes de Mendonca, Fabio Lficio
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [42] Cyber-Threat Proliferation
    Kellerman, Tom
    IEEE SECURITY & PRIVACY, 2010, 8 (03) : 70 - 73
  • [43] Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot
    Rashid, S. M. Zia Ur
    Haq, Ashfaqul
    Hasan, Sayed Tanimun
    Furhad, Md Hasan
    Ahmed, Mohiuddin
    Ullah, Abu Barkat
    WIRELESS NETWORKS, 2024, 30 (05) : 4527 - 4541
  • [44] Exploring the Cyber-Physical Threat Landscape of Water Systems: A Socio-Technical Modelling Approach
    Moraitis, Georgios
    Sakki, Georgia-Konstantina
    Karavokiros, George
    Nikolopoulos, Dionysios
    Tsoukalas, Ioannis
    Kossieris, Panagiotis
    Makropoulos, Christos
    WATER, 2023, 15 (09)
  • [45] Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames
    Vaseashta, Ashok
    Susmann, Philip
    Braman, Eric
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 1 - 10
  • [46] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios
    Bromander, Siri
    2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
  • [47] Cyber-Terror-Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate
    Cavelty, Myriam Dunn
    JOURNAL OF INFORMATION TECHNOLOGY & POLITICS, 2008, 4 (01) : 19 - 36
  • [48] Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond
    Hull, Matthew
    Eze, Thaddeus
    Speakman, Lee
    2018 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2018, : 15 - 22
  • [49] Cyber Threat Trees for Large System Threat Cataloging and Analysis
    Ongsakorn, P.
    Turney, K.
    Thornton, M.
    Nair, S.
    Szygenda, S.
    Manikas, T.
    2010 IEEE INTERNATIONAL SYSTEMS CONFERENCE, 2010, : 610 - 615
  • [50] Factors affecting the power of technological paradigms
    Nelson, Richard R.
    INDUSTRIAL AND CORPORATE CHANGE, 2008, 17 (03) : 485 - 497