Results 81 to 90 of about 62,210 (284)
D4I - Digital forensics framework for reviewing and investigating cyber attacks
Many companies have cited lack of cyber-security as the main barrier to Industrie 4.0 or digitalization. Security functions include protection, detection, response and investigation.
Athanasios Dimitriadis +3 more
doaj +1 more source
Blockchain-oriented approach for detecting cyber-attack transactions
With the high-speed development of decentralized applications, account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value. Financial security has become a top priority with
Zhiqi Feng, Yongli Li, Xiaochen Ma
doaj +1 more source
Malware in the Future? Forecasting of Analyst Detection of Cyber Events
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi +51 more
core +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki +8 more
wiley +1 more source
This review synthesizes EEG findings from 28 VIMS studies across four inducing scenarios (abstract cues, virtual videos, vehicle driving, and game scenes) and two display types (HMD and monitor). While Delta/Theta enhancement consistently reflects sensory conflict, Alpha activity shows context dependency: predominantly increasing during passive viewing
Yanru Bai +5 more
wiley +1 more source
Cyber-Security in Smart Grid: Survey and Challenges
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El +3 more
core +1 more source
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode +3 more
wiley +1 more source
ABSTRACT Technological advancements aligned with sustainability and resilience requirements, as well as, a greater focus on human‐centric perspectives, are creating significant transformations in supply chains in this decade, bringing them to a more developed stage.
Guilherme F. Frederico
wiley +1 more source
Cyber-physical power systems (CPPS), such as smart grids, are essential to modern infrastructure but are increasingly vulnerable to sophisticated cyber-attacks.
Shaharier Kabir +3 more
doaj +1 more source

