Results 41 to 50 of about 19,569 (227)
Este ensayo tiene por objetivo explorar la interconexión entre ciberseguridad y auditoría en el contexto actual, para fortalecer la protección de activos digitales.
Eva Patricia Hau Huang +3 more
doaj +1 more source
Cyber risk management approach from the high business management [PDF]
El mundo actual se encuentra creciendo bajo un marco de globalización aspectos como el internet, las redes sociales, y la evolución tecnológica hacen que la teoría del profesor y filósofo canadiense Marshall Mc Luhan cobre mayor importancia sobre su
Riveros Cardenas, Fredy Orlando
core
CyberESP: An Integrated Cybersecurity Framework for SMEs
ABSTRACT Cybersecurity is a critical global concern, particularly for small‐ and medium‐sized enterprises (SMEs) with limited resources and expertise. The authors are developing CyberESP, a tailored cybersecurity framework supported by a semi‐automated tool to ensure Spanish SMEs' cybersecurity management.
Jose A. Calvo‐Manzano +5 more
wiley +1 more source
Multiclass Classification Procedure for Detecting Attacks on MQTT‐IoT Protocol
The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected ...
Hector Alaiz-Moreton +6 more
wiley +1 more source
Creación de sinergias entre ecosistemas de ciberseguridad locales en la Unión Europea [PDF]
El ISSN corresponde a la versión electrónica del documentoAl disfrutar de una conexión privilegiada con sus ecosistemas locales, las regiones europeas desempeñan un papel importante a la hora de fortalecer la industria europea de la ciberseguridad y su ...
Comisión Europea. Dirección General de Política Regional y Urbana +1 more
core
Regulating Tools for Hacking: Limitations, Challenges and Possibilities
ABSTRACT Tools developed for the purpose of unilaterally exploiting computer systems and their communications will pose a persistent policy and regulatory problem. Regulation of hacking tools to date, however, has been piecemeal, inconsistent and often incoherent.
Diarmaid Harkin, Vas Panagiotopoulos
wiley +1 more source
Secure UAV‐Based System to Detect Small Boats Using Neural Networks
This work presents a system to detect small boats (pateras) to help tackle the problem of this type of perilous immigration. The proposal makes extensive use of emerging technologies like Unmanned Aerial Vehicles (UAV) combined with a top‐performing algorithm from the field of artificial intelligence known as Deep Learning through Convolutional Neural ...
Moisés Lodeiro-Santiago +4 more
wiley +1 more source
El presente trabajo aborda la conexión entre el Reglamento (UE) 2024/2847, sobre ciberseguridad de los productos con elementos digitales (RCR) y la Directiva (UE) 2024/2853, sobre responsabilidad por daños causados por productos defectuosos (DRP).
Guillem Izquierdo Grau
doaj +1 more source
Cibersecurity and ciberdefense: what are they and what implications do they have for home security? [PDF]
Se vive en una era en donde la información va de la mano junto con la tecnología. De allí que ahora la población en general puede acceder a una cantidad significativa de información en tan solo unos pocos segundos, sin importar la distancia que separe a
Vargas Vargas, Edisson Mauricio
core
ABSTRACT In recent years, serious games (SGs) have emerged as a powerful tool in education by combining pedagogy and entertainment, facilitating the acquisition of knowledge and skills in engaging environments. SGs enable the collection of valuable interaction data from students, allowing for the analysis of student performance, with artificial ...
Manuel J. Gomez +4 more
wiley +1 more source

