Results 91 to 100 of about 60,976 (288)

Beyond Compliance: Corporate Governance and the Paradox of Gender Equality: Evidence From EU Firms

open access: yesSustainable Development, EarlyView.
ABSTRACT The UN Sustainable Development Goal (SDG) 5 on gender equality is central to the European Union's sustainability and corporate governance agenda. While recent EU regulations have intensified expectations around board gender diversity (BGD) and social disclosure, the organisational drivers through which governance quality translates into ...
Suzan Dsouza   +2 more
wiley   +1 more source

Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]

open access: yes, 2019
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level

open access: yes, 2017
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core  

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Cybersecurity: mapping the ethical terrain [PDF]

open access: yes
This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others ...
Adam C. Gastineau   +5 more
core  

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]

open access: yes, 2010
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core   +1 more source

Cyber Insurance for Heterogeneous Wireless Networks

open access: yes, 2017
Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume.
Jiang, Hai   +4 more
core   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy