Results 51 to 60 of about 2,054,840 (293)

Cyber Security as a Threat to Health Care

open access: yesJournal of Technology and Systems, 2022
Purpose: Cyber security incidents are posing an increasing risk to the healthcare industry. The healthcare industry has lagged behind other industries in protecting its most important stakeholder (patients), and hospitals must now invest significant ...
A. Adebukola   +4 more
semanticscholar   +1 more source

Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing

open access: yesElectronics, 2023
Cyber-physical security is vital for protecting key computing infrastructure against cyber attacks. Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including data loss, theft, financial loss ...
Sandesh Achar   +4 more
semanticscholar   +1 more source

Longitudinal performance analysis of machine learning based Android malware detectors [PDF]

open access: yes, 2019
This paper presents a longitudinal study of the performance of machine learning classifiers for Android malware detection. The study is undertaken using features extracted from Android applications first seen between 2012 and 2016.
Khan, Sarmadullah, Yerima, Suleiman
core   +1 more source

Fortifying the Global Data Fortress: A Multidimensional Examination of Cyber Security Indexes and Data Protection Measures across 193 Nations

open access: yesInternational Journal of Frontiers in Engineering Technology
: This study conducts a comprehensive examination of the global cyber security landscape by analysing four prominent indexes: the Cybersecurity Exposure Index (CEI), Global Cyber Security Index (GCI), National Cyber Security Index (NCSI), and Digital ...
Yijie Weng, Jianhao Wu
semanticscholar   +1 more source

Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review

open access: yesSustainability, 2022
The incorporation of communication technology with Smart Grid (SG) is proposed as an optimal solution to fulfill the requirements of the modern power system.
Turki Alsuwian   +2 more
semanticscholar   +1 more source

Increasing the cyber resilience of SMEs through open-source solutions and international collaboration

open access: yesBulletin of "Carol I" National Defense University
In an increasingly digitalized world, small and medium-sized enterprises (SMEs) are exposed to significant cyber threats due to limited security resources.
Ionica ȘERBAN   +2 more
doaj   +1 more source

Nepenthes Honeypotsbased Botnet Detection

open access: yesJournal of Advances in Information Technology, 2012
The numbers of the botnet attacks are increasing day by day and the detection of botnet spreading in the network has become very challenging. Bots are having specific characteristics in comparison of normal malware as they are controlled by the remote ...
Sanjeev Kumar   +3 more
doaj   +1 more source

VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks

open access: yesBig Data Mining and Analytics, 2023
With the rapid development of mobile devices, aggregation security and efficiency topics are more important than past in crowd sensing. When collecting large-scale vehicle-provided data, the data transmitted via autonomous networks are publicly ...
Juli Yin   +6 more
doaj   +1 more source

Ultra‐Durable Information‐Encoded Anti‐Counterfeiting Self‐Assembled Nanocrystal Labels

open access: yesAdvanced Optical Materials, EarlyView.
Ultra‐durable cost‐effective information‐encoded anti‐counterfeiting labels are fabricated to secure semiconductor chips. A novel method is used to self‐assemble colloidal quantum wells (CQWs) into color bars. Information can be encoded spatially, spectrally, and opto‐spatially.
Taha Haddadifam   +6 more
wiley   +1 more source

Cyber security Vulnerabilities and Remediation Through Cloud Security Tools

open access: yesJournal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023
The proliferation of internet usage has surged dramatically, prompting individuals and businesses to conduct myriad transactions online rather than in physical spaces. The onset of the COVID-19 pandemic has further propelled this trend.
Fnu Jimmy
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy