Results 31 to 40 of about 2,054,840 (293)
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen +2 more
core +3 more sources
A literature review of financial losses statistics for cyber security and future trend
Cybercrime directs to any criminal activity taken out utilizing computers or the internet. Attackers have chosen strategies such as social engineering, phishing, and malware as part of their cyber-attacks.
Haris Uddin +3 more
semanticscholar +1 more source
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. [PDF]
Background: Cybersecurity is increasingly becoming a prominent concern among healthcare providers in adopting digital technologies for improving the quality of care delivered to patients.
Nifakos S +6 more
europepmc +2 more sources
Anti-forensics techniques, particularly steganography and cryptography, have become increasingly pressing issues affecting current digital forensics practices. This paper advances the automation of hidden evidence extraction in audio files by proposing a
Mohamed Ghane +4 more
doaj +1 more source
A survey on cyber security for smart grid communications [PDF]
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core +1 more source
Modeling and Analysis of the Spread of Malware with the Influence of User Awareness
By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness.
Qingyi Zhu, Xuhang Luo, Yuhang Liu
doaj +1 more source
Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends
The paper presents a classification of cyber attacks within the context of the state of the art in the maritime industry. A systematic categorization of vessel components has been conducted, complemented by an analysis of key services delivered within ...
Mohamed Amine Ben Farah +6 more
semanticscholar +1 more source
Allocating resources is crucial in large-scale distributed computing, as networks of computers tackle difficult optimization problems. Within the scope of this discussion, the objective of resource allocation is to achieve maximum overall computing ...
Moses Ashawa +3 more
doaj +1 more source
From cyber-security deception to manipulation and gratification through gamification [PDF]
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3].
DM Buss +8 more
core +4 more sources
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
In recent years, machine learning algorithms, and more specifically deep learning algorithms, have been widely used in many fields, including cyber security.
Ishai Rosenberg +3 more
semanticscholar +1 more source

