Skip to content

Advertisement

Cybersecurity: Trends, Issues, and Challenges

In today’s Internet-connected world where technologies underpin almost every facet of our society, cyber security and forensics specialists are increasingly dealing with wide ranging cyber threats in almost real-time conditions. The capability to detect, analyze and defend against such threats in near real-time conditions is not possible without employment of threat intelligence, big data and machine learning techniques. For example, when a significant amount of data is collected from or generated by different security monitoring solutions, intelligent and next generation big-data analytical techniques are necessary to mine, interpret and extract knowledge of these unstructured/structured (big) data. Thus, this gives rise to cyber threat intelligence and analytics solutions, such as big data, artificial intelligence and machine learning, to perceive, reason, learn and act against cyber adversaries tactics, techniques and procedures.

Edited by: Krzysztof Cabaj, Wojciech Mazurczyk, Warsaw, Zbigniew Kotulski and Bogdan Księżopolski

  1. Content type: Review

    The fifth generation (5G) of cellular networks will bring 10 Gb/s user speeds, 1000-fold increase in system capacity, and 100 times higher connection density. In response to these requirements, the 5G networks...

    Authors: Filipo Sharevski

    Citation: EURASIP Journal on Information Security 2018 2018:8

    Published on:

  2. Content type: Research

    Current attacks are complex and stealthy. The recent WannaCry malware campaign demonstrates that this is true not only for targeted operations, but also for massive attacks. Complex attacks can only be describ...

    Authors: Julio Navarro, Véronique Legrand, Aline Deruyver and Pierre Parrend

    Citation: EURASIP Journal on Information Security 2018 2018:6

    Published on:

  3. Content type: Research

    Transaction traces analysis is a key utility for marketing, trend monitoring, and fraud detection purposes. However, they can also be used for designing and verification of contextual risk management systems f...

    Authors: Albert Sitek and Zbigniew Kotulski

    Citation: EURASIP Journal on Information Security 2018 2018:5

    Published on:

  4. Content type: Review

    Behind firewalls, more and more cybersecurity attacks are specifically targeted to the very network where they are taking place. This review proposes a comprehensive framework for addressing the challenge of c...

    Authors: Pierre Parrend, Julio Navarro, Fabio Guigou, Aline Deruyver and Pierre Collet

    Citation: EURASIP Journal on Information Security 2018 2018:4

    Published on:

  5. Content type: Research

    Although 5G (fifth generation) networks are still in the realm of ideas, their architecture can be considered as reaching a forming phase. There are several reports and white papers which attempt to precise 5G...

    Authors: Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Marcin Tunia, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko and Jean-Philippe Wary

    Citation: EURASIP Journal on Information Security 2018 2018:2

    Published on: