• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

网络安全的新兴趋势:对当前威胁的全面审视、评估解决方案以及开拓新领域。

Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers.

作者信息

Zaid Taskeen, Garai Suman

机构信息

Associate Professor IT, Jain (Deemed to be University), Bengaluru, Karnataka, India.

Kalinga Institute of Industrial Technology, Bhubaneshwar, Odisha, India.

出版信息

Blockchain Healthc Today. 2024 Apr 30;7. doi: 10.30953/bhty.v7.302. eCollection 2024.

DOI:10.30953/bhty.v7.302
PMID:38715765
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11073482/
Abstract

In an era dominated by digital advancements, cybersecurity plays a pivotal role in safeguarding information and systems from evolving threats. The escalating sophistication of cyber threats necessitates a critical examination of the efficacy of contemporary defenses. Recognizing the limitations and gaps in current solutions, this research introduces a pioneering framework aimed at fortifying cyber defenses. Motivated by a comprehensive exploration of research articles, surveys, online media, and practical studies, this study scrutinizes the intricacies of cyber threats and assesses the strengths and weaknesses of existing solutions. The proposed frameworks emerge from a meticulous feasibility and practicality study, leveraging insights garnered from diverse online sources. The "how" encompasses a comparative analysis, evaluating the novel framework against established solutions to delineate their respective merits and shortcomings. The impetus behind this research lies in offering valuable insights to researchers, practitioners, and policymakers grappling with the multifaceted challenges of cybersecurity. By navigating through the complexities of existing solutions and introducing innovative frameworks, this paper aims to guide efforts in bolstering cyber defenses. Ultimately, this research envisions a continuous cycle of improvement and evolution in the realm of cybersecurity as stakeholders collectively strive to adapt to the ever-changing digital threat landscape.

摘要

在一个由数字进步主导的时代,网络安全在保护信息和系统免受不断演变的威胁方面发挥着关键作用。网络威胁日益复杂,这就需要对当代防御措施的有效性进行批判性审视。认识到当前解决方案的局限性和差距,本研究引入了一个旨在加强网络防御的开创性框架。受对研究文章、调查、在线媒体和实际研究的全面探索的推动,本研究仔细研究了网络威胁的复杂性,并评估了现有解决方案的优缺点。所提出的框架源自一项细致的可行性和实用性研究,利用了从各种在线来源获得的见解。“如何”包括一项比较分析,将新框架与既定解决方案进行评估,以勾勒出它们各自的优缺点。这项研究的背后动力在于为应对网络安全多方面挑战的研究人员、从业者和政策制定者提供有价值的见解。通过梳理现有解决方案的复杂性并引入创新框架,本文旨在指导加强网络防御的努力。最终,本研究设想随着利益相关者共同努力适应不断变化的数字威胁格局,网络安全领域将不断改进和发展。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/eb360b30975f/BHTY-7-302-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/4d1004fee514/BHTY-7-302-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/7c07d96b79a2/BHTY-7-302-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/10fc4016fcfd/BHTY-7-302-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/c08058c4bcad/BHTY-7-302-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/91afca86364e/BHTY-7-302-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/79b8e1c856ab/BHTY-7-302-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/1d81409ddfea/BHTY-7-302-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/eb360b30975f/BHTY-7-302-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/4d1004fee514/BHTY-7-302-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/7c07d96b79a2/BHTY-7-302-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/10fc4016fcfd/BHTY-7-302-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/c08058c4bcad/BHTY-7-302-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/91afca86364e/BHTY-7-302-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/79b8e1c856ab/BHTY-7-302-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/1d81409ddfea/BHTY-7-302-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d1ad/11073482/eb360b30975f/BHTY-7-302-g008.jpg

相似文献

1
Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers.网络安全的新兴趋势:对当前威胁的全面审视、评估解决方案以及开拓新领域。
Blockchain Healthc Today. 2024 Apr 30;7. doi: 10.30953/bhty.v7.302. eCollection 2024.
2
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
3
Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs.预算有限的网络安全:评估开源 SIEM 解决方案在中小企业中的安全性和性能。
PLoS One. 2024 Mar 28;19(3):e0301183. doi: 10.1371/journal.pone.0301183. eCollection 2024.
4
CyberEduPlatform: an educational tool to improve cybersecurity through anomaly detection with Artificial Intelligence.网络教育平台:一种通过人工智能进行异常检测来提高网络安全的教育工具。
PeerJ Comput Sci. 2024 Jun 14;10:e2041. doi: 10.7717/peerj-cs.2041. eCollection 2024.
5
We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.我们需要瞄准高端:与网络和信息安全决策者的网络安全意识相关的因素。
PLoS One. 2024 Oct 18;19(10):e0312266. doi: 10.1371/journal.pone.0312266. eCollection 2024.
6
Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.用于网络安全风险评估的恶意性特征描述与度量
Front Psychol. 2018 Feb 5;9:39. doi: 10.3389/fpsyg.2018.00039. eCollection 2018.
7
Usability and Feasibility Evaluation of a Web-Based and Offline Cybersecurity Resource for Health Care Organizations (The Essentials of Cybersecurity in Health Care Organizations Framework Resource): Mixed Methods Study.医疗保健组织基于网络和离线的网络安全资源的可用性和可行性评估(医疗保健组织网络安全框架资源要点):混合方法研究
JMIR Form Res. 2024 Apr 11;8:e50968. doi: 10.2196/50968.
8
Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.网络治理在确保网络安全方面的研究:网络安全治理概述
Int Cybersecur Law Rev. 2022;3(1):7-34. doi: 10.1365/s43439-021-00045-4. Epub 2022 Jan 11.
9
Integrating machine learning for sustaining cybersecurity in digital banks.整合机器学习以维持数字银行的网络安全。
Heliyon. 2024 Sep 6;10(17):e37571. doi: 10.1016/j.heliyon.2024.e37571. eCollection 2024 Sep 15.
10
Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations.企业韧性的数字转型与网络安全挑战:问题与建议
Sensors (Basel). 2023 Jul 25;23(15):6666. doi: 10.3390/s23156666.

引用本文的文献

1
Applying the defense model to strengthen information security with artificial intelligence in computer networks of the financial services sector.应用防御模型,借助人工智能加强金融服务部门计算机网络中的信息安全。
Sci Rep. 2025 Aug 19;15(1):30292. doi: 10.1038/s41598-025-15034-4.