Results 271 to 280 of about 2,054,840 (293)
Some of the next articles are maybe not open access.
E‐commerce supply chains with considerations of cyber‐security: Should governments play a role?
Production and operations management, 2022E‐commerce supply chains and their members face risks from cyber‐attacks. Consumers who purchase goods online also risk having their private information stolen. Thus, businesses are investing to improve cyber‐security at a nontrivial cost. In this paper,
Suyuan Luo, T. Choi
semanticscholar +1 more source
Cyber Security Threats on Digital Banking
International Conference on Applied Informatics and Communication, 2022Digital banking is the new form of banking that involves using the internet and mobile applications and excludes the use of pen and paper. One of the main issues that are associated with the form of banking is the presence of several forms of security ...
Haitham M. Alzoubi +6 more
semanticscholar +1 more source
A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs)
IEEE transactions on intelligent transportation systems (Print), 2021As the general development trend of the automotive industry, connected and autonomous vehicles (CAVs) can be used to increase transportation safety, promote mobility choices, reduce user costs, and create new job opportunities.
Xiaoqiang Sun, F. Yu, Peng Zhang
semanticscholar +1 more source
Network Security, 2014
This chapter focuses on the understanding and skills needed by tomorrow's business leaders, namely understanding what security teams do and why security is so challenging based on external influences such as cyber espionage, warfare, and crime, which are currently having an adverse impact on the trust that customers have on the Internet and e-Business ...
openaire +2 more sources
This chapter focuses on the understanding and skills needed by tomorrow's business leaders, namely understanding what security teams do and why security is so challenging based on external influences such as cyber espionage, warfare, and crime, which are currently having an adverse impact on the trust that customers have on the Internet and e-Business ...
openaire +2 more sources
Large Language Models for Cyber Security: A Systematic Literature Review
ACM Transactions on Software Engineering and MethodologyThe rapid advancement of Large Language Models (LLMs) has opened up new opportunities for leveraging artificial intelligence in a variety of application domains, including cybersecurity. As the volume and sophistication of cyber threats continue to grow,
Hanxiang Xu +8 more
semanticscholar +1 more source
Anticipation in Cyber-security
2017Organisations, governments and users are increasingly vulnerable to cyberattacks, which effects may range from threatening the foundation of modern information society, to causing catastrophic failure of nation-wide critical infrastructure. As a result, a great deal of effort has been given to mitigating the risks stemming from cyber-attacks and has ...
Ahrend, JM, Jirotka, M
openaire +1 more source
Cyber Security Threats and Countermeasures in Digital Age
Journal of Applied Science and Education (JASE)Due to the quick development of technology, the digital age has brought with it ad-vantages never before seen, but it has also opened the door to a flood of new cyber security concerns.
Manikant thakur
semanticscholar +1 more source
2020
New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence.
openaire +2 more sources
New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence.
openaire +2 more sources
Applied Artificial Intelligence as Event Horizon Of Cyber Security
2022 International Conference on Business Analytics for Technology and Security (ICBATS), 2022The world is digitizing at an unprecedented rate. Information systems and technology are changing or evolving very fast. With advances in technology, the speed of processes, and the amount of data generated daily, it is almost impossible for systems to ...
Atif Ali +5 more
semanticscholar +1 more source

