Knowledge Extraction from Chinese Records of Cyber Attacks Based on a Semantic Grammar

Author(s):  
Fang Fang ◽  
Ya Wang ◽  
Luchen Zhang ◽  
Cungen Cao
2019 ◽  
Vol 25 (3) ◽  
pp. 500-513
Author(s):  
P.V. Revenkov ◽  

2018 ◽  
Vol 24 (3) ◽  
pp. 629-640
Author(s):  
P.V. Revenkov ◽  
◽  
A.A. Berdyugin ◽  

2006 ◽  
Vol 3 (1) ◽  
pp. 48-55
Author(s):  
Aparesh Sood ◽  
◽  
Ankush Mittal ◽  
Divya Sarthi ◽  
◽  
...  

2019 ◽  
Vol 7 (1) ◽  
pp. 14-26
Author(s):  
Ruti Gafni ◽  
Tal Pavel

Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.


2018 ◽  
Author(s):  
Anil Lamba ◽  
Satinderjeet Singh ◽  
Balvinder Singh ◽  
Natasha Dutta ◽  
Sivakumar Sai Rela Muni

Sign in / Sign up

Export Citation Format

Share Document