Skip to content

Advertisement

Cybersecurity: Trends, Issues, and Challenges

In today’s Internet-connected world where technologies underpin almost every facet of our society, cyber security and forensics specialists are increasingly dealing with wide ranging cyber threats in almost real-time conditions. The capability to detect, analyze and defend against such threats in near real-time conditions is not possible without employment of threat intelligence, big data and machine learning techniques. For example, when a significant amount of data is collected from or generated by different security monitoring solutions, intelligent and next generation big-data analytical techniques are necessary to mine, interpret and extract knowledge of these unstructured/structured (big) data. Thus, this gives rise to cyber threat intelligence and analytics solutions, such as big data, artificial intelligence and machine learning, to perceive, reason, learn and act against cyber adversaries tactics, techniques and procedures.

Edited by: Krzysztof Cabaj, Wojciech Mazurczyk, Warsaw, Zbigniew Kotulski and Bogdan Księżopolski

  1. Content type: Research

    Current attacks are complex and stealthy. The recent WannaCry malware campaign demonstrates that this is true not only for targeted operations, but also for massive attacks. Complex attacks can only be describ...

    Authors: Julio Navarro, Véronique Legrand, Aline Deruyver and Pierre Parrend

    Citation: EURASIP Journal on Information Security 2018 2018:6

    Published on:

  2. Content type: Review

    Behind firewalls, more and more cybersecurity attacks are specifically targeted to the very network where they are taking place. This review proposes a comprehensive framework for addressing the challenge of c...

    Authors: Pierre Parrend, Julio Navarro, Fabio Guigou, Aline Deruyver and Pierre Collet

    Citation: EURASIP Journal on Information Security 2018 2018:4

    Published on:

  3. Content type: Research

    Although 5G (fifth generation) networks are still in the realm of ideas, their architecture can be considered as reaching a forming phase. There are several reports and white papers which attempt to precise 5G...

    Authors: Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Marcin Tunia, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko and Jean-Philippe Wary

    Citation: EURASIP Journal on Information Security 2018 2018:2

    Published on: