Results 91 to 100 of about 62,210 (284)
Intrusion Detection System for Detecting Cyber Attacks
The proposed topology for a wireless networked control system is learnt under several cyber-attack situations, and a distributed intrusion detection system (IDS) is created to see the presence of attacks. More particularly, the paper shows a modeling structure for the closed-loop control system with the IDS, and a computational method to create and ...
Dr. A.Annamalai giri +2 more
openaire +1 more source
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
Securing CPS Through Simultaneous Analog Side-Channel Monitoring of Cyber and Physical Domains
The continuing proliferation of Cyber Physical Systems (CPSs), those that integrate electronic control circuitry with a mechanical system allowing software commands to affect the physical world, while allowing for new efficiencies and convenience, also ...
Andrew Kacmarcik, Milos Prvulovic
doaj +1 more source
Beyond Compliance: Corporate Governance and the Paradox of Gender Equality: Evidence From EU Firms
ABSTRACT The UN Sustainable Development Goal (SDG) 5 on gender equality is central to the European Union's sustainability and corporate governance agenda. While recent EU regulations have intensified expectations around board gender diversity (BGD) and social disclosure, the organisational drivers through which governance quality translates into ...
Suzan Dsouza +2 more
wiley +1 more source
A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray +2 more
core +2 more sources
Knowledge graph reasoning for cyber attack detection
Abstract In today's digital landscape, cybercriminals are constantly evolving their tactics, making it challenging for traditional cybersecurity methods to keep up. To address this issue, this study explores the potential of knowledge graph reasoning as a more adaptable and sophisticated approach to identify and counter network ...
Ezekia Gilliard +2 more
openaire +2 more sources
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Renewable Energy‐Driven Green Electricity Supplement for Empowering Blue Economy
In order to support the blue economy to expand to the distant sea, this work proposes the framework driven by renewable energy. It integrates flexible perovskite solar cells, triboelectric nanogenerator‐supercapacitors, grid‐forming control strategies, and AI‐driven digital engines.
Ruibo Fan +5 more
wiley +1 more source
Machine learning (ML) algorithms are widely used in various fields, including cyber threat intelligence (CTI), financial technology (Fintech), and intrusion detection systems (IDSs). They automate security alert data analysis, enhancing attack detection,
Algimantas Venčkauskas +2 more
doaj +1 more source
Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley +1 more source

