Results 101 to 110 of about 1,171,713 (299)

Cyber Attacks

open access: yes, 2007
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire   +2 more sources

Using Deep Learning Conditional Value‐at‐Risk Based Utility Function in Cryptocurrency Portfolio Optimisation

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT One of the critical risks associated with cryptocurrency assets is the so‐called downside risk, or tail risk. Conditional Value‐at‐Risk (CVaR) is a measure of tail risks that is not normally considered in the construction of a cryptocurrency portfolio.
Xinran Huang   +3 more
wiley   +1 more source

Cyber-Attacks, Cryptocurrencies and Cyber Security

open access: yes, 2023
This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM   +3 more
openaire   +5 more sources

Young adult self‐harm: The role of victimisation and polygenic risk in a population‐based longitudinal study

open access: yesJCPP Advances, EarlyView.
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki   +8 more
wiley   +1 more source

Simulating a Cyber-Attack on the Mass Thruster Controllers at Low-Speed Motion

open access: yesPromet (Zagreb)
The aim of this paper is to highlight the vulnerability of Maritime Autonomous Surface Ships (MASS) to cyber-attack and to illustrate, through a simulation experiment on a testbed, how to mitigate a cyber-attack on the MASS thruster controllers during ...
Igor ASTROV, Sanja BAUK
doaj   +1 more source

Planning for the Future of Cyber Attack Attribution : Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology, 111th Cong., July 15, 2010 (Statement by Adjunct Professor Marc Rotenberg, Geo. U. L. Center) [PDF]

open access: yes, 2010
Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr.
Rotenberg, Marc
core   +1 more source

The contribution of vibrational spectroscopy and data analytics towards the achievement of the global sustainability goals

open access: yesJournal of the Science of Food and Agriculture, EarlyView.
Abstract The United Nations Sustainable Development Goals (UN SDGs) were defined to improve the quality of life of the global population particularly regarding social and economic aspects, with a major focus on environmental sustainability. The incorporation of digital technologies into the agri‐food sector has become a key enabler in increasing the ...
Daniel Cozzolino, Louwrens C Hoffman
wiley   +1 more source

Pattern Analysis of Topological Attacks in Cyber-Physical Power Systems Considering Cascading Outages

open access: yesIEEE Access, 2020
Modern cyber-physical power systems are vulnerable to cyber attacks. Given that cyber and physical networks are coupled tightly, attacks in the cyber layer can penetrate the physical layer, causing the outage of transmission lines and other physical ...
Zhimei Zhang   +3 more
doaj   +1 more source

Life after herbarium digitisation: Physical and digital collections, curation and use

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton   +39 more
wiley   +1 more source

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

Home - About - Disclaimer - Privacy