Results 51 to 60 of about 2,054,840 (293)
Cyber Security as a Threat to Health Care
Purpose: Cyber security incidents are posing an increasing risk to the healthcare industry. The healthcare industry has lagged behind other industries in protecting its most important stakeholder (patients), and hospitals must now invest significant ...
A. Adebukola +4 more
semanticscholar +1 more source
Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing
Cyber-physical security is vital for protecting key computing infrastructure against cyber attacks. Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including data loss, theft, financial loss ...
Sandesh Achar +4 more
semanticscholar +1 more source
Longitudinal performance analysis of machine learning based Android malware detectors [PDF]
This paper presents a longitudinal study of the performance of machine learning classifiers for Android malware detection. The study is undertaken using features extracted from Android applications first seen between 2012 and 2016.
Khan, Sarmadullah, Yerima, Suleiman
core +1 more source
: This study conducts a comprehensive examination of the global cyber security landscape by analysing four prominent indexes: the Cybersecurity Exposure Index (CEI), Global Cyber Security Index (GCI), National Cyber Security Index (NCSI), and Digital ...
Yijie Weng, Jianhao Wu
semanticscholar +1 more source
Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review
The incorporation of communication technology with Smart Grid (SG) is proposed as an optimal solution to fulfill the requirements of the modern power system.
Turki Alsuwian +2 more
semanticscholar +1 more source
In an increasingly digitalized world, small and medium-sized enterprises (SMEs) are exposed to significant cyber threats due to limited security resources.
Ionica ȘERBAN +2 more
doaj +1 more source
Nepenthes Honeypotsbased Botnet Detection
The numbers of the botnet attacks are increasing day by day and the detection of botnet spreading in the network has become very challenging. Bots are having specific characteristics in comparison of normal malware as they are controlled by the remote ...
Sanjeev Kumar +3 more
doaj +1 more source
VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks
With the rapid development of mobile devices, aggregation security and efficiency topics are more important than past in crowd sensing. When collecting large-scale vehicle-provided data, the data transmitted via autonomous networks are publicly ...
Juli Yin +6 more
doaj +1 more source
Ultra‐Durable Information‐Encoded Anti‐Counterfeiting Self‐Assembled Nanocrystal Labels
Ultra‐durable cost‐effective information‐encoded anti‐counterfeiting labels are fabricated to secure semiconductor chips. A novel method is used to self‐assemble colloidal quantum wells (CQWs) into color bars. Information can be encoded spatially, spectrally, and opto‐spatially.
Taha Haddadifam +6 more
wiley +1 more source
Cyber security Vulnerabilities and Remediation Through Cloud Security Tools
The proliferation of internet usage has surged dramatically, prompting individuals and businesses to conduct myriad transactions online rather than in physical spaces. The onset of the COVID-19 pandemic has further propelled this trend.
Fnu Jimmy
semanticscholar +1 more source

