Results 91 to 100 of about 61,508 (265)
A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray +2 more
core +2 more sources
Beyond Compliance: Corporate Governance and the Paradox of Gender Equality: Evidence From EU Firms
ABSTRACT The UN Sustainable Development Goal (SDG) 5 on gender equality is central to the European Union's sustainability and corporate governance agenda. While recent EU regulations have intensified expectations around board gender diversity (BGD) and social disclosure, the organisational drivers through which governance quality translates into ...
Suzan Dsouza +2 more
wiley +1 more source
Securing CPS Through Simultaneous Analog Side-Channel Monitoring of Cyber and Physical Domains
The continuing proliferation of Cyber Physical Systems (CPSs), those that integrate electronic control circuitry with a mechanical system allowing software commands to affect the physical world, while allowing for new efficiencies and convenience, also ...
Andrew Kacmarcik, Milos Prvulovic
doaj +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola +2 more
wiley +1 more source
Machine learning (ML) algorithms are widely used in various fields, including cyber threat intelligence (CTI), financial technology (Fintech), and intrusion detection systems (IDSs). They automate security alert data analysis, enhancing attack detection,
Algimantas Venčkauskas +2 more
doaj +1 more source
A Systems Engineering Methodology for System of Autonomous Systems: Test and Evaluation
ABSTRACT Recent advances in artificial intelligence and machine learning (AI/ML) have resulted in autonomous systems that reduce operators' workload and involvement in hazardous missions. Integrating these systems into an existing system of systems (SoS) can evolve it into a system of autonomous system (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley +1 more source
Combining Physical and Network Data for Attack Detection in Water Distribution Networks
Water distribution infrastructures are increasingly incorporating the IoT in the form of sensing and computing power to improve control over the system and achieve greater adaptability to water demand.
Côme Frappé - - Vialatoux +1 more
doaj +1 more source
Predictive Analytics-Enabled Cyber Attack Detection
Cyber-attacks are becoming increasingly sophisticated and difficult to detect using traditional security measures. To address this challenge, we propose a predictive analytics- enabled cyber-attack detection system that utilizes machine learning algorithms to analyze network traffic and identify potential security threats in real time.
Sahana Susheela +2 more
openaire +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source

