Results 51 to 60 of about 52,803 (214)
A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems
A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network.
Sangjun Kim, Kyung-Joon Park
doaj +1 more source
USBcat - Towards an Intrusion Surveillance Toolset
This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner.
Chapman, Chris, Dean, Tom, Knight, Scott
core +2 more sources
Senior corporate executives, government officials, and academics have become aware that there are: i) serious financial and regulatory costs arising from cyber-attacks (Pearson, 2014; Sugarman, 2014; US Securities and Exchange Commission, 2014); ii) vulnerabilities in high-value assets such as supervisory-control and dataacquisition systems (Ashford ...
openaire +1 more source
The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi +3 more
wiley +1 more source
The now ubiquitous use of information technology poses a crucial challenge to the cyber security of power grid operations, one that has aroused serious concerns from both industry and academia.
Xiaoge Huang, Zhijun Qin, Hui Liu
doaj +1 more source
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza +2 more
wiley +1 more source
Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation
This article explores how cyber-attacks affect freedom of expression. It begins by outlining the literature on cyber coercion and exploring other conceptions of how offensive cyber operations have been used to shape adversary behaviour, including efforts
Burton Joe
doaj +1 more source
Cyber security and the unexplored threat to global health: a call for global norms
Cyber-attacks against hospitals, medical devices, and healthcare entities are becoming increasingly common; simultaneously, physical attacks against hospitals and healthcare entities are increasing. The purpose of this article is to explore the threat to
Rose Bernard +2 more
doaj +1 more source
Predicting Cyber Events by Leveraging Hacker Sentiment
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Deb, Ashok +2 more
core +1 more source
There is increasing enthusiasm for, and recognition of, the benefits that artificial intelligence (AI) can provide to society. The emphasis has been on the positive, but AI and deep learning can be used for negative purposes. Modular Neural Networks (MNN) are capable of independent learning and have been targeted at evolutionary, complex financial ...
Angela Mison, Gareth Davies, Peter Eden
openaire +2 more sources

