Showing 301 - 320 results of 358 for search '"cybersecurity"', query time: 0.05s Refine Results
  1. 301

    Until you have something to lose! Loss aversion and two-factor authentication adoption by Ahmad R. Pratama, Firman M. Firmansyah

    Published 2025-01-01
    “…Originality/value – Authentication is one of the most important topics in cybersecurity that is related to human-computer interaction. …”
    Get full text
    Article
  2. 302
  3. 303

    Integrating artificial intelligence in energy transition: A comprehensive review by Qiang Wang, Yuanfan Li, Rongrong Li

    Published 2025-01-01
    “…It also highlights the potential of AI to advance energy system stability, address cybersecurity risks, and promote equitable and sustainable energy systems. …”
    Get full text
    Article
  4. 304

    Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI Strategies by Alaa Omran Almagrabi, Rafiq Ahmad Khan

    Published 2025-01-01
    “…Considering the current weaknesses and threats related to GAI we provide a systematic approach to how safety concerns that are currently relevant can be integrated with every stage of Artificial Intelligence (AI) lifecycle management: from continuous monitoring to the application of cybersecurity trends and practices, etc. In our approach, the emphasis is placed on the multi-level security management strategy that incorporates the improvement of coding practices, validation and testing, and the implementation of advanced intrusion detection systems. …”
    Get full text
    Article
  5. 305

    Navigating the Challenges and Opportunities of Securing Internet of Autonomous Vehicles With Lightweight Authentication by Hazem Ismail Ali, Harrison Kurunathan, Mohamed Hamdy Eldefrawy, Flavius Gruian, Magnus Jonsson

    Published 2025-01-01
    “…These challenges cannot be directly addressed by standard cybersecurity solutions designed primarily for static IoT environments. …”
    Get full text
    Article
  6. 306

    GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks by Vahid Babaey, Arun Ravindran

    Published 2024-12-01
    “…The widespread adoption of web services has heightened exposure to cybersecurity threats, particularly SQL injection (SQLi) attacks that target the database layers of web applications. …”
    Get full text
    Article
  7. 307

    THE IMPACT OF COVID-19 ON THE IT SECTOR: WAS THE ADJUSTMENT AS EASY AS IT SEEMED? THE CASE OF CROATIA by Julia Perić, Ružica Stanić

    Published 2022-05-01
    “…In addition, this paper answers whether and to what extent IT companies had to adapt their business models and what other challenges (cybersecurity, new platforms, etc.) they had to respond to. …”
    Get full text
    Article
  8. 308

    Perspectives of implementing software packaged system “Personnel Management System of the National Police of Ukraine” into the activities of the National Police of Ukraine by V. A. Korshenko

    Published 2018-11-01
    “…It has been alleged that the software package system “Personnel Management System of the National Police of Ukraine”, which was fully designed and developed by the employees of the research laboratory dealing with information protection and cybersecurity of Kharkiv National University of Internal Affairs customized by the Human Resourcing Department of the National Police of Ukraine, has no analogues among domestic and foreign software products. …”
    Get full text
    Article
  9. 309
  10. 310

    A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats by Hazem M. Kotb, Tarek Gaber, Salem AlJanah, Hossam M. Zawbaa, Mohammed Alkhathami

    Published 2025-01-01
    “…While primarily evaluated on synthetic datasets, the high accuracy of the DS-IID model suggests its potential as a valuable tool for real-world cybersecurity applications.…”
    Get full text
    Article
  11. 311

    Opportunities and challenges halal tourism in Indonesia in the era of human-centered technology (society 5.0) by Fikry Ramadhan Suhendar, Nurlailiyah Aidatus Sholihah

    Published 2024-11-01
    “…However, major challenges are still faced related to standardization, infrastructure quality, human resource quality, global competition, and cybersecurity risks. Overcoming these challenges requires a collaborative strategy between the government and the private sector, utilization of technology for efficiency and safety, improving the quality of human resources, and more intensive promotion in both domestic and international markets. …”
    Get full text
    Article
  12. 312
  13. 313

    Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models by Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, Ammar Battah, Norbert Tihanyi

    Published 2024-01-01
    “…Despite providing unparalleled connectivity and convenience, the exponential growth of the Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These concerns stem from various factors, including the heterogeneity of IoT devices, widespread deployment, and inherent computational limitations. …”
    Get full text
    Article
  14. 314

    ADA-NAF: Semi-Supervised Anomaly Detection Based on the Neural Attention Forest by Andrey Ageev, Andrei Konstantinov, Lev Utkin

    Published 2025-01-01
    “…Our results validate the ADA-NAF’s effectiveness and versatility as a robust solution for real-world anomaly detection challenges with promising applications in cybersecurity, industrial monitoring, and healthcare diagnostics. …”
    Get full text
    Article
  15. 315

    Testing convolutional neural network based deep learning systems: a statistical metamorphic approach by Faqeer ur Rehman, Clemente Izurieta

    Published 2025-01-01
    “…., healthcare, autonomous driving, finance, manufacturing, cybersecurity, etc. Metamorphic testing (MT) is considered a simple but very powerful approach in testing such computationally complex systems for which either an oracle is not available or is available but difficult to apply. …”
    Get full text
    Article
  16. 316

    The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs): by Mugisha, Justin, Francis Adyanga, Akena, Ocan, Johnson

    Published 2025
    “…Also, it was found that building workforce capacity through collaborations and customized training programs can help close the skills gap, while improving cybersecurity and implementing efficient data management frameworks can help with privacy issues. …”
    Get full text
    Article
  17. 317
  18. 318

    Enterprises as Complex Systems: Navigating Challenges and Embracing Resilience by Dimitry Borissov

    Published 2024-10-01
    “…Technological advancements, including artificial intelligence, the Internet of Things, and big data, add layers of operational complexity, demanding robust data management, cybersecurity measures, and seamless integration with legacy systems. …”
    Get full text
    Article
  19. 319

    Aukus (Australia-united kingdom-united states) threat to Indo-pacific security by Ismiyatun Ismiyatun, Ita Puji Lestari

    Published 2024-11-01
    “…Countries can provide funding to enhance their cybersecurity capabilities, which could include investing in cyber defense measures to protect critical military infrastructure and networks. …”
    Get full text
    Article
  20. 320