Results 111 to 120 of about 111,415 (271)
Towards a relation extraction framework for cyber-security concepts
In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed.
Bridges R. A. +4 more
core +1 more source
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode +3 more
wiley +1 more source
In-Vehicle Communication Cyber Security: Challenges and Solutions. [PDF]
Rathore RS +3 more
europepmc +1 more source
Cyber security picture 2013 [PDF]
Summary: This report summarises cyber intrusion activity identified by or reported to the Cyber Security Operations Centre (CSOC) during 2013. It provides a broad overview of cyber threats to Australian government networks, as observed by the CSOC.
core
Exploring the motivation behind cybersecurity insider threat and proposed research agenda [PDF]
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of the most significant cyber security threat vector, while posing a great concern to corporations and governments.
Clarke, Karla +2 more
core
Land Use Transformation and Climate Resilience in Smart Cities: Role of ICT in Modern Urban Planning
ABSTRACT Modern urban planning is experiencing a transition from traditional planning to the integration of information technology, which defines the concept of a “smart city”. The study analyses the evolution of urban planning practices with an emphasis on the role of engineering and architecture in the process of urbanization, the transition to the ...
Dariusz Cichoń
wiley +1 more source
iCNN-LSTM+: A Batch-Based Incremental Ransomware Detection System Using Sysmon
Ransomware remains a persistent and evolving cyber threat, requiring adaptive and efficient detection mechanisms. This study presents a novel CNN-LSTM-based detection system that leverages Sysmon logs for real-time analysis on Windows endpoints.
Jamil Ispahany +3 more
doaj +1 more source
LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution. [PDF]
Bouzidi M +4 more
europepmc +1 more source
Data‐Based Detection of Antagonistic Agents in a Robot Swarm Solving a Dynamic Coverage Task
ABSTRACT Robot swarms can be deployed as moving surveillance systems, for instance, as mobile anti‐poaching systems for monitoring wildlife and detecting poaching activities. Since poachers have an interest in evading detection, robots are at risk of being hijacked and manipulated to behave antagonistically, for example, to prevent the correct ...
Ingeborg Wenger +2 more
wiley +1 more source
Visioning ecologically diverse and harmonious futures of Korea in Good Anthropocene
Abstract The Korean Demilitarized Zone (DMZ), a buffer between North and South Korea, holds profound historical, cultural and ecological significance, as well as exceptional potential for conservation and transformation. This study explores ecologically diverse and peaceful futures for the Korean Peninsula by envisioning the DMZ as a landscape for ...
HyeJin Kim +24 more
wiley +1 more source

