Results 111 to 120 of about 111,415 (271)

Towards a relation extraction framework for cyber-security concepts

open access: yes, 2015
In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed.
Bridges R. A.   +4 more
core   +1 more source

Archetypes of SME Resilience: A Systematic Literature Review of Antecedents, Types and Outcomes of Resilience in SMEs

open access: yesStrategic Change, EarlyView.
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode   +3 more
wiley   +1 more source

In-Vehicle Communication Cyber Security: Challenges and Solutions. [PDF]

open access: yesSensors (Basel), 2022
Rathore RS   +3 more
europepmc   +1 more source

Cyber security picture 2013 [PDF]

open access: yes
Summary: This report summarises cyber intrusion activity identified by or reported to the Cyber Security Operations Centre (CSOC) during 2013. It provides a broad overview of cyber threats to Australian government networks, as observed by the CSOC.

core  

Exploring the motivation behind cybersecurity insider threat and proposed research agenda [PDF]

open access: yes, 2016
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of the most significant cyber security threat vector, while posing a great concern to corporations and governments.
Clarke, Karla   +2 more
core  

Land Use Transformation and Climate Resilience in Smart Cities: Role of ICT in Modern Urban Planning

open access: yesLand Degradation &Development, EarlyView.
ABSTRACT Modern urban planning is experiencing a transition from traditional planning to the integration of information technology, which defines the concept of a “smart city”. The study analyses the evolution of urban planning practices with an emphasis on the role of engineering and architecture in the process of urbanization, the transition to the ...
Dariusz Cichoń
wiley   +1 more source

iCNN-LSTM+: A Batch-Based Incremental Ransomware Detection System Using Sysmon

open access: yesIEEE Access
Ransomware remains a persistent and evolving cyber threat, requiring adaptive and efficient detection mechanisms. This study presents a novel CNN-LSTM-based detection system that leverages Sysmon logs for real-time analysis on Windows endpoints.
Jamil Ispahany   +3 more
doaj   +1 more source

LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution. [PDF]

open access: yesSensors (Basel), 2023
Bouzidi M   +4 more
europepmc   +1 more source

Data‐Based Detection of Antagonistic Agents in a Robot Swarm Solving a Dynamic Coverage Task

open access: yesInternational Journal of Mechanical System Dynamics, EarlyView.
ABSTRACT Robot swarms can be deployed as moving surveillance systems, for instance, as mobile anti‐poaching systems for monitoring wildlife and detecting poaching activities. Since poachers have an interest in evading detection, robots are at risk of being hijacked and manipulated to behave antagonistically, for example, to prevent the correct ...
Ingeborg Wenger   +2 more
wiley   +1 more source

Visioning ecologically diverse and harmonious futures of Korea in Good Anthropocene

open access: yesPeople and Nature, EarlyView.
Abstract The Korean Demilitarized Zone (DMZ), a buffer between North and South Korea, holds profound historical, cultural and ecological significance, as well as exceptional potential for conservation and transformation. This study explores ecologically diverse and peaceful futures for the Korean Peninsula by envisioning the DMZ as a landscape for ...
HyeJin Kim   +24 more
wiley   +1 more source

Home - About - Disclaimer - Privacy