Showing 241 - 260 results of 358 for search '"cybersecurity"', query time: 0.04s Refine Results
  1. 241
  2. 242
  3. 243

    A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques by Serkan Gönen

    Published 2024-12-01
    “…The research findings not only contribute to the theoretical and practical concerns about the effective protection of IIoT systems but also offer hope for the future of cybersecurity in these systems.…”
    Get full text
    Article
  4. 244

    Resilient Event Triggered Interval Type-2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks by Amir Mohammed, Craig Ramlal, Lincoln Marine, Fasil Muddeen

    Published 2024-01-01
    “…However, over the past few years, cybersecurity threats have posed significant challenges to such systems, given the ever-evolving automotive industry. …”
    Get full text
    Article
  5. 245
  6. 246

    Analysis of the implications of digital voting through neutrosophic Delphi modeling by Diego Pablo Palma Rivera, Silvio Amable Machuca Vivar, Bolívar Enrique Villalta Jadan, Misael Abisai Valarezo Bracho

    Published 2024-11-01
    “…Future research should focus on enhancing cybersecurity and digital education to foster trust in electronic voting systems further.…”
    Get full text
    Article
  7. 247

    Comparative evaluation between Java application using JNI and native C/C++ application running on an Android platform. by Alison de Oliveira Venâncio, Thales Ruano Barros de Souza, Bruno Raphael Cardoso Dias

    Published 2025-01-01
    “…This article evaluated the performance difference between Java applications using JNI with the NDK and native C/C++ applications, focusing on algorithms widely used in various areas such as automation, networking, telecom, cybersecurity, etc. We conducted sequence of executions initiated either through a graphical interface or via the Android Debug Bridge (ADB) command line, with timing performed by external hardware with its own firmware for this evaluation. …”
    Get full text
    Article
  8. 248

    A Detection Method Against Load Redistribution Attacks in the Interdependence of the Natural Gas Network and Power System Based on Entropy by Yaoying Wang

    Published 2023-09-01
    “…However, the advanced information and communication equipment in these integrated electricity-gas energy systems give rise to cybersecurity concerns. This research proposes an entropy-based load redistribution (LR) attack detection approach for such integrated networks. …”
    Get full text
    Article
  9. 249

    Mining Community-Level Influence in Microblogging Network: A Case Study on Sina Weibo by Yufei Liu, Dechang Pi, Lin Cui

    Published 2017-01-01
    “…Social influence analysis is important for many social network applications, including recommendation and cybersecurity analysis. We observe that the influence of community including multiple users outweighs the individual influence. …”
    Get full text
    Article
  10. 250

    A Survey of Deep Anomaly Detection in Multivariate Time Series: Taxonomy, Applications, and Directions by Fengling Wang, Yiyue Jiang, Rongjie Zhang, Aimin Wei, Jingming Xie, Xiongwen Pang

    Published 2025-01-01
    “…Multivariate time series anomaly detection (MTSAD) can effectively identify and analyze anomalous behavior in complex systems, which is particularly important in fields such as financial monitoring, industrial equipment fault detection, and cybersecurity. MTSAD requires simultaneously analyze temporal dependencies and inter-variable relationships have prompted researchers to develop specialized deep learning models to detect anomalous patterns. …”
    Get full text
    Article
  11. 251

    Optimizing PoS agent banking for inclusive rural economies: by Ishmael Obaeko IWARA

    Published 2024-12-01
    “…However, the success of PoS banking is hindered by cybersecurity risks, fraud, agent credibility issues, and physical security threats like robbery. …”
    Get full text
    Article
  12. 252
  13. 253
  14. 254

    Prerequisites for the legal mechanisms development to combat disinformation in social media in the context of national security: problem statement by A. I. Marushchak

    Published 2021-12-01
    “…In the context of capacity building of the Centre for Countering Disinformation, counteracting disinformation campaigns for national security reasons requires a combination of efforts of the Centre with the national cybersecurity system, and with regulatory bodies of the media, strategic communications units of Ukraine Government in close cooperation with the private sector, primarily social media companies, and civil society. …”
    Get full text
    Article
  15. 255
  16. 256

    Digital Transformation and Performance Optimization at XYZ Higher Education through TOGAF-Based Enterprise Architecture by Widia Febriyani, Samsudin Samsudin

    Published 2024-11-01
    “…A central goal of XYZ University’s digital transformation efforts is to streamline its business processes and bolster its cybersecurity framework. These initiatives are critical to the university’s broader strategy of developing a robust Enterprise Architecture (EA). …”
    Get full text
    Article
  17. 257

    Transforming Alliances: A 20-Year Overview of Singapore-US Relations under Lee Hsien Loong by TRUONG HUE

    Published 2025-01-01
    “…It also examines how both countries have expanded their cooperation into non-traditional security areas such as counterterrorism, cybersecurity, and environmental security, adapting to the evolving global security environment. …”
    Get full text
    Article
  18. 258

    An Algorithm for Improving Email Security on the Android Operating System in the Industry 4.0 Era by Isaac Moses Kisembo, Gilbert Gilibrays Ocen, Ocident Bongomin, Andrew Egwar Alunyu, Ildephonse Nibikora, Davis Matovu, Felix Bwire

    Published 2021-01-01
    “…With several technologies shaping industry 4.0 epoch, notably, its cybersecurity entails the security of communication and network operations activities. …”
    Get full text
    Article
  19. 259

    Development of an Intelligent Communication Platform for Remote Practical Work in Education: Integrating AR, VR, and Cloud Technologies by El Gourari Abdelali, Ezzini Mustapha, Raoufi Mustapha, Skouri Mohammed, Achki Samira, Ait Lahcen Yassine, Mouachi Raja

    Published 2024-01-01
    “…Key features include real-time collaboration, personalized learning experiences, and seamless access to virtual labs, all supported by robust cybersecurity measures and scalable infrastructure. The platform integrates with existing learning management systems (LMS) to provide a flexible and secure learning environment. …”
    Get full text
    Article
  20. 260

    Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments by Abdallah Farraj, Eman Hammad

    Published 2024-12-01
    “…Establishing robust cybersecurity for Internet of Things (IoT) ecosystems poses significant challenges for system operators due to IoT resource constraints, trade-offs between security and performance, diversity of applications, and their security requirements, usability, and scalability. …”
    Get full text
    Article