Results 141 to 150 of about 2,054,840 (293)

Cyber security picture 2013 [PDF]

open access: yes
Summary: This report summarises cyber intrusion activity identified by or reported to the Cyber Security Operations Centre (CSOC) during 2013. It provides a broad overview of cyber threats to Australian government networks, as observed by the CSOC.

core  

Mean-field-game model for Botnet defense in Cyber-security

open access: yes, 2015
We initiate the analysis of the response of computer owners to various offers of defence systems against a cyber-hacker (for instance, a botnet attack), as a stochastic game of a large number of interacting agents.
Bensoussan, Alain, Kolokoltsov, Vassili
core   +1 more source

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, EarlyView.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

Motivation and hygiene factors for curriculum (re)development and the embedding of technology in accounting programmes

open access: yesAccounting &Finance, EarlyView., 2023
Abstract Using Herzberg's two‐factor theory, this paper examines the hygiene and motivation factors that drive (re)development in accounting higher education programmes. Interviews with accounting educators and discipline leaders demonstrate a range of factors at play in the (re)development of accounting programmes in pursuit of embedding relevant ...
Esin Ozdil   +3 more
wiley   +1 more source

iCNN-LSTM+: A Batch-Based Incremental Ransomware Detection System Using Sysmon

open access: yesIEEE Access
Ransomware remains a persistent and evolving cyber threat, requiring adaptive and efficient detection mechanisms. This study presents a novel CNN-LSTM-based detection system that leverages Sysmon logs for real-time analysis on Windows endpoints.
Jamil Ispahany   +3 more
doaj   +1 more source

LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution. [PDF]

open access: yesSensors (Basel), 2023
Bouzidi M   +4 more
europepmc   +1 more source

From ESG to Sustainable Development: A Path Designed for the Triple Helix Spheres

open access: yesSustainable Development, EarlyView.
ABSTRACT This work examines the relationship between environmental, social, and governance (ESG) initiatives and sustainable development (SD), highlighting a scientific gap in their effective connection. It aims to propose a framework with recommendations for promoting SD through ESG, considering the governmental, business, and academic spheres from ...
Elen Cristina Bravos Giupponi   +3 more
wiley   +1 more source

Digital Futures, Sustainable Outcomes: Mapping the Impact of Digital Transformation on EU SDG Progress

open access: yesSustainable Development, EarlyView.
ABSTRACT This study explores how digital transformation, measured by the Global Digitalisation Index (GDI), relates to progress on the UN Sustainable Development Goals (SDGs) across EU member states. Using partial correlation, regression analysis with interaction terms and cluster analysis, the research examines the moderating effects of governance and
Luis Fonseca   +4 more
wiley   +1 more source

A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

open access: yesComputers & security, 2023
Morteza Safaei Pour   +3 more
semanticscholar   +1 more source

A Method for Assessing the Risks to Sustainability Posed by Process Operations

open access: yesSustainable Development, EarlyView.
ABSTRACT We present a framework for assessing the risks to sustainability posed by any given set of processes. The objective is to improve sustainability by enabling better decision‐making in policy and business contexts. The framework can be applied to any system of processes where available information supports discovery and quantification of ...
Richard C. Darton, Colin J. Axon
wiley   +1 more source

Home - About - Disclaimer - Privacy