🚨 New article now available online!

As new attack strategies emerge, network intrusion detection systems are subject to increasing pressure. Accurate classification of potential threats requires both adequate analysis of complex data sets and effective utilisation of computational resources available.
Researchers Akanksha Pamena and Manohar Naik Sugali propose an approach combining deep learning for dimensionality reduction with attention modules: SAE-AM. Their solution proves highly effective, reaching 99% accuracy on benchmark datasets. Read the latest article on our website, “SAE-AM: Enhancing Network Intrusion Detection Using Sparse Autoencoders with Attention Modules” and learn more about their method.
https://www.acigjournal.com/SAE-AM-Enhancing-Network-Intrusion-Detection-Using-Sparse-Autoencoders-with-Attention,213872,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#cybersecurity #machineLearning #networkSecurity #intrusionDetection #machineLearning #deepLearning

🚨 New article now available online!

Managing large quantities of information is a challenge that has to be addressed in many areas of modern economy, including those relatively removed from the IT field. As the research shows, the construction industry often lags behind the other sectors in terms of data protection and organisation.
Ornella Tanga Tambwe, Clinton Ohis Aigbavboa, Opeoluwa Israel Akinradewo, and Seyi Segun Stephen offer a case study in the current state of the field. In their paper “The Impact of Data Governance on Data Management in the South African Construction Industry,” they present results of a survey conducted among professionals from the South African capital province of Gauteng along with their implications for further decision making.
Learn more about their findings and analysis: https://www.acigjournal.com/The-Impact-of-Data-Governance-on-Data-Management-in-the-South-African-Construction,213473,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#construction #constructionIndustry #dataProtection #dataManagement #dataGovernance

🚨 New article now available online!

It is clear by now that generative artificial intelligence is changing the way information is disseminated and received. Sadly, it has been found a useful tool by perpetuators of disinformation and spreaders of malicious narratives destabilizing trust in public institutions. Muhammad Sajid Khan approaches the problem from the social cybersecurity standpoint and proposes a framework for identifying and neutralizing this kind of threats: STRIDE ¬– Social Threat Resilience through Integrated Detection and Engagement.
Read his paper “Social Cybersecurity as Digital Resilience: The STRIDE Framework for Countering AI-Driven Information Manipulation” on our website: https://www.acigjournal.com/Social-Cybersecurity-as-Digital-Resilience-The-STRIDE-Framework-for-Countering-AI,213864,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#AI #ArtificialIntelligence #disinformation #socialCybersecurity

🚨 New article now available online!

Energy transition of an entity so complex and populous as the European Union cannot be reduced to its purely technical aspects. Interplay of economic and national interests, societal attitudes, and narratives demands an analysis from the political sciences and sociology standpoint. In terms of security, it must be noted that this process is a potential and actual goal of disinformation campaigns and cognitive warfare, carried out both by state actors and corporate entities, such as fossil fuel companies.
In his paper “Cognitive Warfare, Disinformation, and Corporate Influence in Europe’s Energy Transition: Information Control, Regulation, and Human Rights Implications” Marco Marsili provides an analysis of techniques and vectors of cognitive influence, and case studies of disinformation campaigns. He goes on to assess the current defence mechanisms of the EU and present recommendations for the improvement of its “cognitive resilience.”
Read the whole article on our website: https://www.acigjournal.com/Cognitive-Warfare-Disinformation-and-Corporate-Influence-in-Europe-s-Energy-nTransition,214045,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#energyTransition #EU #disinformation #cognitiveWarfare #hybridWarfare

🚨 New article now available online!

Modern infrastructure is dependent on many diverse service providers, whose individual vulnerabilities contribute to the risk model of the target systems. Adding artificial intelligence to the equation only complicates the issue further. Yet the critical services need a high level of resilience and standard compliance. In their paper “Supply Chain Security and AI Risk Governance Model for Critical Infrastructure under NIS2, CER, and CRA” Natalija Parlov, Gordan Akrap, and Josip Esterhajer provide an analysis of multiple security standards and present measures for assessment and systemic improvement of infrastructural resilience.
Read it on our website: https://www.acigjournal.com/Supply-Chain-Security-and-AI-Risk-Governance-Model-for-Critical-Infrastructure-under,211823,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#cybersecurity #supplyChain #supplyChainSecurity #riskManagement #AISecurity

🚨 New article now available online!

The field of #DevSecOps framework development, aiming to incorporate insights from psychology and social sciences into the process of software creation, is still a new one. In their paper “Challenges in DevSecOps Decision-Making amid a Dearth of Valid Frameworks” Francesco Maria Ferazza and Konstantinos Mersinas argue that there are still no widely accepted robust strategies. The researchers analyse existing frameworks in light of decision theory and note that the current situation in the area presents an opportunity for real-life observation of subsequent adaptations.
Read the article online at https://www.acigjournal.com/Challenges-in-DevSecOps-Decision-Making-amid-a-Dearth-of-Valid-Frameworks,213726,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#cybersecurity #softwareDevelopment #devOps

This #cyberFriday we would like to remind you of an article offering insights into the methodology of #cybersecurity data gathering and its cross-national comparison for sake of informed policy-making. Come back to “Structured Field Coding and its Applications to National Risk and Cybersecurity Assessments” by William H. Dutton, Ruth Shillair, Louise Axon, and Carolin Weisser.
As always available on our website: https://www.acigjournal.com/Structured-Field-Coding-and-its-Applications-to-National-Risk-and-Cybersecurity-Assessments,184303,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute

🚨 New article now available online!

More digital technologies bring greater convenience and efficiency, but also expand the attack surface and increase security risks. In the light of this, EU’S #CyberResilienceAct introduces requirements pertaining to vulnerability disclosure and mitigation. Jukka Ruohonen and Paul Timmers examine the act’s details and sketch out the directions for future research.
Read their paper “Vulnerability Coordination under the Cyber Resilience Act,” now available at https://www.acigjournal.com/Vulnerability-Coordination-under-the-Cyber-Resilience-Act,213350,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute

#cybersecurity #vulnerability #cra

🚨 New article now available online!

Today, more than at any previous point in history, traditional warfare is being combined with non-kinetic threats, such as broadly conceived attacks on the state’s information security. Appropriate defence mechanisms require institutional cooperation and adaptability. Emir Muhić, in his new paper “Transforming the Intelligence Cycle through Adapting to Complex Environments and the Operational Dynamics of Special Warfare,” reviews the existing approaches and develops a model presenting how intelligence processes can evolve to meet the realities of modern hybrid and special warfare.
Read the article at https://www.acigjournal.com/Transforming-the-Intelligence-Cycle-through-Adapting-to-Complex-Environments-and,211788,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute

This #cyberFriday is the time to recommend you one of the insightful articles from our archive.

Honeypots are often employed by cybersecurity teams to gain insights into possible attack scenarios. But both sides in this scenario are acting with limited knowledge. Thus a way to model the probability of various outcomes is highly useful.
In their paper “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process” Lidong Wang, Reed Mosher, Patti Duett, and Terril Falls provide a mathematical analysis of interactions with networks of this kind. Learn more about their results: https://www.acigjournal.com/Predictive-Modelling-of-a-Honeypot-System-Based-on-a-Markov-Decision-Process-and,184296,0,2.html#idm66

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#cybersecurity #honeypot