Results 81 to 90 of about 61,508 (265)
D4I - Digital forensics framework for reviewing and investigating cyber attacks
Many companies have cited lack of cyber-security as the main barrier to Industrie 4.0 or digitalization. Security functions include protection, detection, response and investigation.
Athanasios Dimitriadis +3 more
doaj +1 more source
Blockchain-oriented approach for detecting cyber-attack transactions
With the high-speed development of decentralized applications, account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value. Financial security has become a top priority with
Zhiqi Feng, Yongli Li, Xiaochen Ma
doaj +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki +8 more
wiley +1 more source
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode +3 more
wiley +1 more source
Cyber Attack detection Using Big data analysis
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer networks and the myriad of recent content-based threats, which occur daily. As well as an overview of machine learning approaches for signature and anomaly detection methods, this article discusses several machine learning strategies applied to intrusion ...
Yazeed Al Moaiad +3 more
openaire +1 more source
Data‐Based Detection of Antagonistic Agents in a Robot Swarm Solving a Dynamic Coverage Task
ABSTRACT Robot swarms can be deployed as moving surveillance systems, for instance, as mobile anti‐poaching systems for monitoring wildlife and detecting poaching activities. Since poachers have an interest in evading detection, robots are at risk of being hijacked and manipulated to behave antagonistically, for example, to prevent the correct ...
Ingeborg Wenger +2 more
wiley +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Cyber-physical power systems (CPPS), such as smart grids, are essential to modern infrastructure but are increasingly vulnerable to sophisticated cyber-attacks.
Shaharier Kabir +3 more
doaj +1 more source
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source

