Results 271 to 280 of about 2,054,840 (293)
Some of the next articles are maybe not open access.

E‐commerce supply chains with considerations of cyber‐security: Should governments play a role?

Production and operations management, 2022
E‐commerce supply chains and their members face risks from cyber‐attacks. Consumers who purchase goods online also risk having their private information stolen. Thus, businesses are investing to improve cyber‐security at a nontrivial cost. In this paper,
Suyuan Luo, T. Choi
semanticscholar   +1 more source

Cyber Security Threats on Digital Banking

International Conference on Applied Informatics and Communication, 2022
Digital banking is the new form of banking that involves using the internet and mobile applications and excludes the use of pen and paper. One of the main issues that are associated with the form of banking is the presence of several forms of security ...
Haitham M. Alzoubi   +6 more
semanticscholar   +1 more source

A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs)

IEEE transactions on intelligent transportation systems (Print), 2021
As the general development trend of the automotive industry, connected and autonomous vehicles (CAVs) can be used to increase transportation safety, promote mobility choices, reduce user costs, and create new job opportunities.
Xiaoqiang Sun, F. Yu, Peng Zhang
semanticscholar   +1 more source

Cyber Security

Network Security, 2014
This chapter focuses on the understanding and skills needed by tomorrow's business leaders, namely understanding what security teams do and why security is so challenging based on external influences such as cyber espionage, warfare, and crime, which are currently having an adverse impact on the trust that customers have on the Internet and e-Business ...
openaire   +2 more sources

Large Language Models for Cyber Security: A Systematic Literature Review

ACM Transactions on Software Engineering and Methodology
The rapid advancement of Large Language Models (LLMs) has opened up new opportunities for leveraging artificial intelligence in a variety of application domains, including cybersecurity. As the volume and sophistication of cyber threats continue to grow,
Hanxiang Xu   +8 more
semanticscholar   +1 more source

Anticipation in Cyber-security

2017
Organisations, governments and users are increasingly vulnerable to cyberattacks, which effects may range from threatening the foundation of modern information society, to causing catastrophic failure of nation-wide critical infrastructure. As a result, a great deal of effort has been given to mitigating the risks stemming from cyber-attacks and has ...
Ahrend, JM, Jirotka, M
openaire   +1 more source

Cyber Security Threats and Countermeasures in Digital Age

Journal of Applied Science and Education (JASE)
Due to the quick development of technology, the digital age has brought with it ad-vantages never before seen, but it has also opened the door to a flood of new cyber security concerns.
Manikant thakur
semanticscholar   +1 more source

Cyber Security

2015
Interviews
Steven E. Collier   +4 more
openaire   +2 more sources

Cyber Security

2020
New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence.
openaire   +2 more sources

Applied Artificial Intelligence as Event Horizon Of Cyber Security

2022 International Conference on Business Analytics for Technology and Security (ICBATS), 2022
The world is digitizing at an unprecedented rate. Information systems and technology are changing or evolving very fast. With advances in technology, the speed of processes, and the amount of data generated daily, it is almost impossible for systems to ...
Atif Ali   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy