Results 141 to 150 of about 111,415 (271)

2. Cyber security [PDF]

open access: yesDigitale Welt, 2017
openaire   +1 more source

Industry 5.0 for Sustainable Healthcare Services: Analyzing the Prospects and Obstacles for the Indian Healthcare System

open access: yesSustainable Development, EarlyView.
ABSTRACT The fifth industrial revolution (I5.0), which is based on the utilization of interconnected data for efficient resource usage in meeting human requirements, proposes efficient solutions to resource constraint situations. However, the transition to I5.0 in the health sector is not easy and has to face several obstacles.
Ajay Jha   +5 more
wiley   +1 more source

Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization. [PDF]

open access: yesSensors (Basel), 2022
Alterazi HA   +6 more
europepmc   +1 more source

Operationalizing the Metaverse for Urban Sustainability: Evidence From an Expert Panel and the Seoul Metaverse City Case Study

open access: yesSustainable Development, EarlyView.
ABSTRACT Smart cities and urban digital twins have fostered the emergence of immersive environments, such as the metaverse. While contemporary scholarlship has increasingly examined the integration of the metaverse within smart city infrastructures, the critical nexus between urban sustainability and the metaverse remains largely under‐researched. This
Jose Manuel Diaz‐Sarachaga   +1 more
wiley   +1 more source

Developing a Framework for the Quality‐Driven Migration to Microservices: A Multi‐Method Design Science Study

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Context The microservices architectural style has revolutionized the way modern software systems are developed and operated. While the development of new microservices systems can leverage a wide range of resources and proven strategies, the migration of an existing monolithic system is not easily generalizable.
Jonas Fritzsch   +6 more
wiley   +1 more source

Motivation and hygiene factors for curriculum (re)development and the embedding of technology in accounting programmes

open access: yesAccounting &Finance, EarlyView., 2023
Abstract Using Herzberg's two‐factor theory, this paper examines the hygiene and motivation factors that drive (re)development in accounting higher education programmes. Interviews with accounting educators and discipline leaders demonstrate a range of factors at play in the (re)development of accounting programmes in pursuit of embedding relevant ...
Esin Ozdil   +3 more
wiley   +1 more source

Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. [PDF]

open access: yesSensors (Basel), 2022
Alahmadi AN   +5 more
europepmc   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy