Using deep learning to detect digitally encoded DNA trigger for Trojan malware in Bio-Cyber attacks. [PDF]
Islam MS +7 more
europepmc +1 more source
Unpacking Resilience in Public Administration: Insights From a Meta‐Narrative Review
ABSTRACT Increasing environmental complexity and uncertainty have made organizational resilience a key concern in public administration. Yet its inherent ambiguity calls for a systematic examination of its conceptualizations, operationalizations, and applications. This meta‐narrative review synthesizes 49 studies, advancing the discourse by identifying
Jixiang Li, Shui‐Yan Tang, Bo Wen
wiley +1 more source
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
Cyber ttacks - Russian Federation's mechanicm of influence in Ukraine [PDF]
Currently, the international community is facing a hybrid conflict in Ukraine, where traditional and cyber weapons are being used at the same time. The big surprise of the Russian invasion was the apparent absence of a major cyber war.
Victoria Bevziuc, Svetlana Cebotari
doaj
Healthcare cyber-attacks and the COVID-19 pandemic: an urgent threat to global health. [PDF]
Muthuppalaniappan M, Stevenson K.
europepmc +1 more source
Law and Infrastructure: Reliability, Automation Transition, and Irregularities of “U‐Space”
ABSTRACT The European Union (EU) is making regulatory efforts to allow for the safe integration of drones into civilian airspace through automated means. Commission Implementing Regulation (EU) 2021/664 concerning unmanned traffic management (a system referred to as “U‐Space”) furthers that commitment. Accordingly, drone operators must avail themselves
Samar Abbas Nawaz
wiley +1 more source
Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles. [PDF]
Elsisi M, Tran MQ.
europepmc +1 more source
Informal Firms' Adoption and Use of Mobile Money Under Uncertain Times: Evidence From Burkina Faso
ABSTRACT This paper investigates how uncertainty affects mobile money adoption and use by informal businesses. Despite the prevalence of the informal sector in developing countries and the recognized potential of mobile money for financial inclusion, empirical research on its adoption and usage among unregistered businesses is limited.
Serge Stéphane Ky, Clovis Rugemintwari
wiley +1 more source
A spyware detection method for firmware based cyber attacks. [PDF]
Shamshirsaz BA, Asghari SA, Aminian M.
europepmc +1 more source
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems. [PDF]
Wang W +4 more
europepmc +1 more source

