Challenges in Cybersecurity and Privacy - The European Research Landscape 2022
DOI: 10.1201/9781003337492-8
|View full text |Cite
|
Sign up to set email alerts
|

A Cybersecurity Situational Awareness and Information-sharing Solution for Local Public Administrations Based on Advanced Big Data Analysis: The CS-AWARE Project

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“… Enhanced Data Fusion: Efforts are being made to integrate different forms of data, such as text, images, and audio, to achieve a more comprehensive understanding of the cyber environment [130].  Semantic Analysis: Technologies like NLP are being utilized to derive deeper insights from text data, enhancing the understanding of user behavior and potential threats [131].…”
Section: Multimodal Data Integrationmentioning
confidence: 99%
“… Enhanced Data Fusion: Efforts are being made to integrate different forms of data, such as text, images, and audio, to achieve a more comprehensive understanding of the cyber environment [130].  Semantic Analysis: Technologies like NLP are being utilized to derive deeper insights from text data, enhancing the understanding of user behavior and potential threats [131].…”
Section: Multimodal Data Integrationmentioning
confidence: 99%
“…The paper also highlights the potential of AI systems to automate many tasks, freeing up valuable time for IT personnel, and their ability to act quickly and accurately in response to threats. Incorporating the foundational insights from our base papers [1][2], we understand that the application of AI and ML in cybersecurity, as discussed in [3][4], is not just a technological upgrade but a paradigm shift in how we approach the detection and prevention of online terrorism. The integration of these technologies promises a more robust and responsive cybersecurity infrastructure capable of anticipating and mitigating threats in real-time.…”
Section: Background and Challengesmentioning
confidence: 99%
“…In conclusion, the data sources and feature engineering processes are foundational to the deployment of AI and ML in the detection of online terrorism. The insights from our base papers [1][2], along with the additional context from [3][4] [5][6] [7], provide a multifaceted view of how data is harnessed and optimized to train models that are both accurate and robust in identifying and preventing terrorist activities online.…”
Section: E Importance Of Feature Engineeringmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, educational approaches that engage humans at both the individual and group/organizational level, to actively pursue good cyber defense cognitions and behaviors, will arguably make for a resilient organization in the face of emerging cyber threats. With the exception of very recent suggestions for holistic intervention approaches (Pirta-Dreimane et al, 2022;Schaberreiter et al, 2022), there is a general lack of studies and interventions that simultaneously target cybersecurity performance at both the individual and group level (Ask et al, 2021a).…”
Section: Introductionmentioning
confidence: 99%