Results 21 to 30 of about 2,054,840 (293)

Cyber range design framework for cyber security education and training

open access: yesInternational Journal of Information Security, 2023
The need for effective training of cyber security personnel working in critical infrastructures and in the corporate has brought attention to the evolution of Cyber Ranges (CRs) as learning and training tools.
Menelaos N. Katsantonis   +3 more
semanticscholar   +1 more source

Enhancing Cyber Security Governance and Policy for SMEs in Industry 5.0: A Comparative Study between Saudi Arabia and the United Kingdom

open access: yesDigit., 2023
The emergence of Industry 5.0 has revolutionized technology by integrating physical systems with digital networks. These advancements have also led to an increase in cyber threats, posing significant risks, particularly for small and medium-sized ...
Nisha Rawindaran   +6 more
semanticscholar   +1 more source

Cyber security fear appeals:unexpectedly complicated [PDF]

open access: yes, 2020
Cyber security researchers are starting to experiment with fear appeals, with a wide variety of designs and reported efficaciousness. This makes it hard to derive recommendations for designing and deploying these interventions. We thus reviewed the wider
Albayram Y.   +39 more
core   +2 more sources

A Survey on Cyber–Physical Systems Security

open access: yesIEEE Internet of Things Journal, 2023
Cyber–physical systems (CPSs) are new types of intelligent systems that integrate computing, control, and communication technologies, bridging the cyberspace and physical world.
Zhenhua Yu   +4 more
semanticscholar   +1 more source

A Publicly Verifiable E-Voting System Based on Biometrics

open access: yesCryptography, 2023
Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transparency
Jinhui Liu   +5 more
doaj   +1 more source

A Two-Dimensional Key Vector Based Fast and Lightweight Block Cipher for Constrained Devices [PDF]

open access: yesITM Web of Conferences
Gathering sensitive patient information is vital in healthcare for providing the proper therapy. The collected data must also be shared with the relevant parties in order to keep the environment open and honest.
Kakarla Shirisha   +2 more
doaj   +1 more source

A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations

open access: yesIEEE Access, 2022
Small-to-medium sized businesses (SMBs) constitute a large fraction of many countries’ economies but according to the literature SMBs are not adequately implementing cyber security which leaves them susceptible to cyber-attacks.
Alladean Chidukwani   +2 more
semanticscholar   +1 more source

A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports

open access: yesIEEE Access, 2020
Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence of smart airports. Services and systems powered by the IoT enable smart airports to have enhanced robustness, efficiency and control, governed by real-time ...
Nickolaos Koroniotis   +4 more
doaj   +1 more source

AppChainer: investigating the chainability among payloads in android applications

open access: yesCybersecurity, 2023
Statistics show that more than 80 applications are installed on each android smartphone. Vulnerability research on Android applications is of critical importance.
Xiaobo Xiang   +5 more
doaj   +1 more source

Person Re-Identification Method Based on Dual Descriptor Feature Enhancement

open access: yesEntropy, 2023
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy