Results 221 to 230 of about 1,171,713 (299)
Media, fear and the hyperreal: the construction of cyberterrorism as the ultimate threat to critical infrastructures [PDF]
Conway, Maura
core
Crossing the third‐level digital divide through digital literacy programs
Abstract Digital literacy programs (DLPs) implemented by community‐anchored organizations have become a key focus toward achieving digital equity. However, there is a notable lack of quantitative empirical research that measures DLPs' effectiveness in supporting the achievement of tangible benefits of digital literacy (DL), beyond simply acquiring it ...
Yeweon Kim +2 more
wiley +1 more source
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein +3 more
wiley +1 more source
ABSTRACT System dynamics uncertainties and cyberattacks pose significant challenges to load frequency control in power systems. This paper presents a data‐driven load frequency control strategy for interconnected multi‐area power systems subject to denial‐of‐service attacks that disrupt both feedforward and feedback communication channels.
Yuhao Chen +4 more
wiley +1 more source
Digital Twin (DT) technology enhances building energy efficiency by enabling continuous monitoring, predictive maintenance, and operational optimization within Building Energy Management Systems. Through real‐time data integration and simulation, DTs provide dynamic feedback loops that optimize performance, reduce operational costs, and improve ...
Suqi Wang +6 more
wiley +1 more source
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner +5 more
wiley +1 more source
Risk Science in Practice: A Framework for Gauging Risk Principles in Domain‐Specific Discourse
ABSTRACT Risk science is increasingly interwoven across various domains, aiming to be both generalizable and domain‐specific to build consistency and applicability across risk applications. However, those risk discussions, such as in materials that aim to share risk‐related information with stakeholders, may have varying levels of alignment with risk ...
Shital Thekdi, Terje Aven
wiley +1 more source
ABSTRACT This study explores how Norwegian leaders in rural municipalities attend to disaster risk governance and prepare for resilient response to threats from systemic, interconnected, and cascading hazards. Systemic risk management in the Norwegian municipalities will depend on the context and how critical organizational processes are managed by the
Sofie Steinsund +3 more
wiley +1 more source
Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]
Nauman M +4 more
europepmc +1 more source

