A Framework for Budget-Constrained Zero-Day Cyber Threat Mitigation: A Knowledge-Guided Reinforcement Learning Approach. [PDF]
Basak M, Shin GY.
europepmc +1 more source
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner +5 more
wiley +1 more source
Risk Science in Practice: A Framework for Gauging Risk Principles in Domain‐Specific Discourse
ABSTRACT Risk science is increasingly interwoven across various domains, aiming to be both generalizable and domain‐specific to build consistency and applicability across risk applications. However, those risk discussions, such as in materials that aim to share risk‐related information with stakeholders, may have varying levels of alignment with risk ...
Shital Thekdi, Terje Aven
wiley +1 more source
Towards Optimal Sensor Placement for Cybersecurity: An Extensible Model for Defensive Cybersecurity Sensor Placement Evaluation. [PDF]
Wagner N, Damodaran SK, Reavey M.
europepmc +1 more source
ABSTRACT This study explores how Norwegian leaders in rural municipalities attend to disaster risk governance and prepare for resilient response to threats from systemic, interconnected, and cascading hazards. Systemic risk management in the Norwegian municipalities will depend on the context and how critical organizational processes are managed by the
Sofie Steinsund +3 more
wiley +1 more source
Nature-inspired swarm optimization paradigms for securing semantic web frameworks against DDoS attacks: a computational approach. [PDF]
Ganguli C +3 more
europepmc +1 more source
Adaptive residual observer-based detection and isolation framework against false data injection attack in large-scale power systems. [PDF]
Yu X, Gao C, Du Y, Gao B, Tian D, Hou T.
europepmc +1 more source
Integrating NLP and Ensemble Learning into Next-Generation Firewalls for Robust Malware Detection in Edge Computing. [PDF]
Moila RL, Velempini M.
europepmc +1 more source
Practical Predefined-Time Sliding-Mode Adaptive Resilient Control for PMSM Cyber-Physical Systems. [PDF]
Wang Z, Zhang S, Jiang Y, Yin C.
europepmc +1 more source
Optimized ensemble machine learning model for cyberattack classification in industrial IoT. [PDF]
Alabdullah B, Sankaranarayanan S.
europepmc +1 more source

