Showing 281 - 300 results of 358 for search '"cybersecurity"', query time: 0.04s Refine Results
  1. 281

    GLOBAL TRENDS IN REPUTATION MANAGEMENT by Daria Kharamurza, Viktoriia Soshynska

    Published 2024-12-01
    “…Among the current trends in reputation management, the following are important: the presence of a higher goal of the corporate brand, high-quality communication with various groups of stakeholders as the basis of the business strategy, cybersecurity and data protection, the integration of artificial intelligence into work processes (including communication processes), and the ethics of its use. …”
    Get full text
    Article
  2. 282
  3. 283

    Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models by Basim Mahbooba, Radhya Sahal, Wael Alosaimi, Martin Serrano

    Published 2021-01-01
    “…To design and develop AI-based cybersecurity systems (e.g., intrusion detection system (IDS)), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. …”
    Get full text
    Article
  4. 284

    Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge Platforms by Marco De Vincenzi, John Moore, Bradley Smith, Sanjay E. Sarma, Ilaria Matteucci

    Published 2025-01-01
    “…These advancements, however, have heightened exposure to cybersecurity risks. This work reviews emerging security challenges in the CV ecosystem from a new perspective, focusing on the integration of in-vehicle platforms such as the infotainment system and vehicle-edge platforms. …”
    Get full text
    Article
  5. 285
  6. 286

    Digital maturity of business: Technological gap and limitations of digital transformation by I. S. Prokhorova, P. M. Gureev

    Published 2023-06-01
    “…As a result of the study, it was found that the main reasons for the unsystematic processes of digitalization of Russian business are the low quality of business digitalization with high digital activity and low technological capabilities for implementing Industry 4.0 technologies due to the limited use of the Internet mobile network in business, business cybersecurity tools, Internet communications and cloud services. …”
    Get full text
    Article
  7. 287

    Market Trends in 2024 in the IT Project Management Industry by Nicoleta-Madalina Stan, Adrian Bogorin Predescu, Aurel Mihail Titu

    Published 2024-11-01
    “…The increasing importance of cybersecurity and data privacy is influencing project management practices, with a heightened focus on risk management and compliance. …”
    Get full text
    Article
  8. 288

    Proactive Detection of Malicious Webpages Using Hybrid Natural Language Processing and Ensemble Learning Techniques by Althaf Ali A, Rama Devi K, Syed Siraj Ahmed N, Ramchandran P, Parvathi S

    Published 2024-01-01
    “…With accuracy rates exceeding 98%, this framework achieves a robust, scalable solution for real-time web content analysis, providing a critical tool for cybersecurity professionals to detect and block malicious webpages before they can cause harm. …”
    Get full text
    Article
  9. 289

    Examining the integration of artificial intelligence in supply chain management from Industry 4.0 to 6.0: a systematic literature review by Alexander Samuels

    Published 2025-01-01
    “…However, challenges such as cybersecurity risks and workforce skill gaps need to be addressed to fully leverage AI’s potential.ConclusionIntegrating AI in SCM not only improves operational efficiency and sustainability but also promotes resilience against disruptions. …”
    Get full text
    Article
  10. 290

    Peculiarities of legal regulation of activities of the National Police of Ukraine in the field of ensuring information security in Ukraine by I. D. Kazanchuk, V. P. Yatsenko

    Published 2020-12-01
    “…It has been stated that the modern system of ensuring information security and cybersecurity in Ukraine should be one effective system, consisting of such mandatory components as legal, educational and technical. …”
    Get full text
    Article
  11. 291
  12. 292

    A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones by Mansahaj Singh Popli, Rudra Pratap Singh, Navneet Kaur Popli, Mohammad Mamun

    Published 2025-01-01
    “…By preserving privacy and enabling collaborative anomaly detection, FL addresses key cybersecurity challenges in the Internet of Underwater Things (IoUT).…”
    Get full text
    Article
  13. 293
  14. 294

    The Role of Women in Community Development: Reenacting Digital Activism in Improving Education for All Children, Lesson Learned from Tulungagung and Semarang by Palupi Anggraheni, Anjani Tri Fatharini, Hanna Nurhaqiqi, Ratih Pandu Mustikasari, Yohana Grezia Diaz, Miracle Nauli Gultom

    Published 2024-12-01
    “…The concepts of Women in Development and Digital Literacy empowers women to contribute to development, cybersecurity, and children's rights. The results highlight structural issues like poverty and gender inequality as barriers to educational quality across regions, further emphasizing the need for women educators in designing digital literacy programs. …”
    Get full text
    Article
  15. 295

    Anomaly detection of adversarial cyber attacks on electric vehicle charging stations by Sagar Babu Mitikiri, Vedantham Lakshmi Srinivas, Mayukha Pal

    Published 2025-03-01
    “…However, the increasing deployment of EV charging infrastructures (EVCI) introduces cybersecurity challenges, particularly concerning the different vulnerabilities associated with them, leading to cyberattacks. …”
    Get full text
    Article
  16. 296

    THE IMPACT OF COVID-19 ON THE IT SECTOR: WAS THE ADJUSTMENT AS EASY AS IT SEEMED? THE CASE OF CROATIA by Julia Perić, Ružica Stanić

    Published 2022-05-01
    “…In addition, this paper answers whether and to what extent IT companies had to adapt their business models and what other challenges (cybersecurity, new platforms, etc.) they had to respond to. …”
    Get full text
    Article
  17. 297

    DIGITAL SECURITY IN EDUCATIONAL TRAINING PROGRAMS: A STUDY BASED ON FUTURE TEACHERS’ PERCEPTIONS by María José Latorre-Medina, Chaimae Tnibar-Harrus

    Published 2023-06-01
    “…The specific intention is to determine their perception of the instruction they receive on digital matters, concretely on cybersecurity during their phase of pre-service. To carry out the project, the study resorted to a descriptive method by submitting the participants to a specifically designed questionnaire entitled “Digital Security Competence Required for Teachers”. …”
    Get full text
    Article
  18. 298

    The politics of digital sovereignty and the European Union’s legislation: navigating crises by Gábor Hulkó, János Kálmán, András Lapsánszky

    Published 2025-02-01
    “…These crises manifest themselves in various forms, including cybersecurity threats, privacy issues and the economic dominance of global technology companies. …”
    Get full text
    Article
  19. 299

    Possibilities of using of hardware accelerators for intrusion detection and prevention systems by Artem Tetskyi, Artem Perepelitsyn

    Published 2024-11-01
    “…The subject of this study is the capabilities of FPGA technology for cybersecurity solutions with the network interface accelerators of SmartNIC, as well as the technologies for building, deploying, supporting, and accelerating intrusion detection systems and intrusion prevention systems. …”
    Get full text
    Article
  20. 300