Showing 201 - 220 results of 358 for search '"cybersecurity"', query time: 0.04s Refine Results
  1. 201

    A Paradigm for Modeling Infectious Diseases: Assessing Malware Spread in Early-Stage Outbreaks by Egils Ginters, Uga Dumpis, Laura Calvet Liñán, Miquel Angel Piera Eroles, Kawa Nazemi, Andrejs Matvejevs, Mario Arturo Ruiz Estrada

    Published 2024-12-01
    “…As digitalization and artificial intelligence advance, cybersecurity threats intensify, making malware—a type of software installed without authorization to harm users—an increasingly urgent concern. …”
    Get full text
    Article
  2. 202
  3. 203

    A review of electric vehicle technology: Architectures, battery technology and its management system, relevant standards, application of artificial intelligence, cyber security, an... by Vincent M. Macharia, Vijay K. Garg, Dinesh Kumar

    Published 2023-06-01
    “…This article thoroughly overviews cybersecurity challenges in EV applications and explains possible proactive measures. …”
    Get full text
    Article
  4. 204

    Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model by Bin Chen, Hongyi Li, Di Zhao, Yitang Yang, Chengwei Pan

    Published 2024-11-01
    “…Experiments were conducted on two generic datasets and one cybersecurity dataset for knowledge graph quality assessment. …”
    Get full text
    Article
  5. 205

    Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations by Wojciech Wróblewski, Dorota Seliga

    Published 2024-12-01
    “…The Cybersecurity for Fire Protection Systems report from a workshop held by the Research Foundation in 2021 was analysed. …”
    Get full text
    Article
  6. 206
  7. 207

    Impact of Defending Strategy Decision on DDoS Attack by Chunming Zhang

    Published 2021-01-01
    “…Distributed denial-of-service (DDoS) attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently. …”
    Get full text
    Article
  8. 208

    Survei Penelitian Metode Kecerdasan Buatan untuk Mendeteksi Ancaman Teknologi Serangan Siber by Eza Yolanda Fitria, Kusprasapta Mutijarsa

    Published 2023-12-01
    “…The results of this research are expected to contribute to providing new insights into the world of cybersecurity to open future research opportunities, especially for novice researchers who wish to conduct research in the field of cybersecurity. …”
    Get full text
    Article
  9. 209

    End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT by Matthew Boeding, Michael Hempel, Hamid Sharif

    Published 2025-01-01
    “…However, OT protocols often lack the rigor of cybersecurity capabilities that have become a critical characteristic of IT protocols. …”
    Get full text
    Article
  10. 210

    A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks by Nouman Imtiaz, Abdul Wahid, Syed Zain Ul Abideen, Mian Muhammad Kamal, Nabila Sehito, Salahuddin Khan, Bal S. Virdee, Lida Kouhalvandi, Mohammad Alibakhshikenari

    Published 2025-01-01
    “…Unlike traditional approaches, XIoT emphasizes interpretability by integrating explainable AI mechanisms, enabling cybersecurity analysts to understand and trust its predictions. …”
    Get full text
    Article
  11. 211

    Information Security Risk Framework for Digital Transformation Technologies by Eduardo Stefani, Ivanir Costa, Marcos Antonio Gaspar, Roberto de Souza Goes, Rogerio Carlos Monteiro, Breno Ribeiro Petrili, Alexandre de Paula Pereira

    Published 2025-01-01
    “…Researchers have observed that, despite the advantages they bring, the cybersecurity risks associated with these technologies are not fully apparent. …”
    Get full text
    Article
  12. 212

    The Road to Recovery #5: Self-Assessment of Virtual Facilitation to Build Trust by Colby Jordan Silvert, Cody Gusto, John Diaz, Glenn Israel

    Published 2021-03-01
    “…Specific recommendations are provided addressing concerns about short- and long-term virtual trust, inclusion techniques, Zoom fatigue, and cybersecurity. This new 5-page publication of the UF/IFAS Department of Agricultural Education and Communication was written by Colby Silvert, Cody Gusto, John Diaz, and Glenn Israel. https://edis.ifas.ufl.edu/wc388 …”
    Get full text
    Article
  13. 213

    CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD by DRAGOS-ALEXANDRU ANDRIOAIA

    Published 2022-10-01
    “…In this paper, the authors test, through an active sniffing attack, the cybersecurity of the IoT devices that transmit data to the Cloud of the ThingSpeak platform. …”
    Get full text
    Article
  14. 214

    Zmiany w polskim systemie ochrony lotnictwa cywilnego by Łukasz Szymankiewicz

    Published 2023-04-01
    “…The purpose of the article is to present and evaluate the changes in the National Training Program on civil aviation security, with a particular focus on the introduction of the topic of countering internal threats, including radicalization, the introduction of a new cybersecurity training, as well as concerning the expansion of the categories of people covered by the training on civil aviation security awareness. …”
    Get full text
    Article
  15. 215

    The Road to Recovery #5: Self-Assessment of Virtual Facilitation to Build Trust by Colby Jordan Silvert, Cody Gusto, John Diaz, Glenn Israel

    Published 2021-03-01
    “…Specific recommendations are provided addressing concerns about short- and long-term virtual trust, inclusion techniques, Zoom fatigue, and cybersecurity. This new 5-page publication of the UF/IFAS Department of Agricultural Education and Communication was written by Colby Silvert, Cody Gusto, John Diaz, and Glenn Israel. https://edis.ifas.ufl.edu/wc388 …”
    Get full text
    Article
  16. 216

    ANTI-CRISIS FACTORS OF COMPETITIVENESS OF SERVICE SECTOR ENTERPRISES by I. A. Troyan

    Published 2021-02-01
    “…The paper analyses traditional basic factors of enterprise competitiveness as well as substantiates the anti-crisis factors of maintaining the competitive maintenance of a service sector enterprise in the context of the current economic crisis related to the COVID-19 pandemic, such as: digitalization of business and the process of providing services, customer focus, virtualization of the workforce, cybersecurity, and the use of opportunities of the state anti-crisis policy.…”
    Get full text
    Article
  17. 217
  18. 218

    Cybersicurezza e protezione dati: un rapporto ambivalente by Federica Resta

    Published 2024-07-01
    “…In particolare, la protezione dati è stata inizialmente e tradizionalmente concepita come parametro di legittimità dell’attività investigativa funzionale alla tutela della cybersecurity. Tuttavia questa declinazione del rapporto tra tali due interessi giuridici, in termini antagonisti, ha lasciato di lì a poco emergere una più interessante sinergia. …”
    Get full text
    Article
  19. 219
  20. 220

    Modified Autoencoder Training and Scoring for Robust Unsupervised Anomaly Detection in Deep Learning by Nicholas Merrill, Azim Eskandarian

    Published 2020-01-01
    “…We demonstrate significant improvements over conventional AE training on image, remote-sensing, and cybersecurity datasets.…”
    Get full text
    Article