Results 91 to 100 of about 61,083 (243)

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Securing CPS Through Simultaneous Analog Side-Channel Monitoring of Cyber and Physical Domains

open access: yesIEEE Access
The continuing proliferation of Cyber Physical Systems (CPSs), those that integrate electronic control circuitry with a mechanical system allowing software commands to affect the physical world, while allowing for new efficiencies and convenience, also ...
Andrew Kacmarcik, Milos Prvulovic
doaj   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

A Systems Engineering Methodology for System of Autonomous Systems: Test and Evaluation

open access: yesSystems Engineering, EarlyView.
ABSTRACT Recent advances in artificial intelligence and machine learning (AI/ML) have resulted in autonomous systems that reduce operators' workload and involvement in hazardous missions. Integrating these systems into an existing system of systems (SoS) can evolve it into a system of autonomous system (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley   +1 more source

Improving Multi-Class Classification for Recognition of the Prioritized Classes Using the Analytic Hierarchy Process

open access: yesApplied Sciences
Machine learning (ML) algorithms are widely used in various fields, including cyber threat intelligence (CTI), financial technology (Fintech), and intrusion detection systems (IDSs). They automate security alert data analysis, enhancing attack detection,
Algimantas Venčkauskas   +2 more
doaj   +1 more source

Combining Physical and Network Data for Attack Detection in Water Distribution Networks

open access: yesEngineering Proceedings
Water distribution infrastructures are increasingly incorporating the IoT in the form of sensing and computing power to improve control over the system and achieve greater adaptability to water demand.
Côme Frappé - - Vialatoux   +1 more
doaj   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Predictive Analytics-Enabled Cyber Attack Detection

open access: yesInternational Journal of Innovative Science and Research Technology (IJISRT)
Cyber-attacks are becoming increasingly sophisticated and difficult to detect using traditional security measures. To address this challenge, we propose a predictive analytics- enabled cyber-attack detection system that utilizes machine learning algorithms to analyze network traffic and identify potential security threats in real time.
Sahana Susheela   +2 more
openaire   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Detection of Cyber-Attacks in a Discrete Event System Based on Deep Learning

open access: yesMathematics
This paper addresses the problem of cyber-attack detection in a discrete event system by proposing a novel model. The model utilizes graph convolutional networks to extract spatial features from event sequences.
Sichen Ding   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy