D4I - Digital forensics framework for reviewing and investigating cyber attacks. [PDF]
Dimitriadis A +3 more
europepmc +1 more source
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
Motion State Estimation with Bandwidth Constraints and Mixed Cyber-Attacks for Unmanned Surface Vehicles: A Resilient Set-Membership Filtering Framework. [PDF]
Wang Z, Lou P, Wang Y, Li J, Wang J.
europepmc +1 more source
Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications. [PDF]
Al-Eidi S, Darwish O, Chen Y.
europepmc +1 more source
ABSTRACT The global landscape is marked by ongoing transformations and abrupt shifts driven by new forms of globalisation through the expansion of Global Value Chains, the Fourth Industrial Revolution, and recurring crises. This paper examines the role of these key economic, global, and technological challenges in shaping productivity growth across EU ...
Maria Tsiapa
wiley +1 more source
Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use. [PDF]
Tubis AA +4 more
europepmc +1 more source
Nurturing Digital Government Reform: Nuggets of Wisdom From a Global Frontrunner
ABSTRACT Government reform initiatives increasingly incorporate significant digital elements. This article builds on successful, long‐term Danish experiences with digital government reform and offers “nuggets of wisdom” to policymakers, organisations, and countries wishing to advance such reform. In international surveys, Denmark is consistently ranked
Ulrik B. U. Roehl, Andreas Berggreen
wiley +1 more source
Focal Causal Temporal Convolutional Neural Networks: Advancing IIoT Security with Efficient Detection of Rare Cyber-Attacks. [PDF]
Miryahyaei M +2 more
europepmc +1 more source
The Missing Link in Digital Transformation Leadership: Unpacking the Role of Knowledge
ABSTRACT Leading digital transformation (DT) is challenging due to the unforeseen hurdles that arise through the novelty of digital technologies and the broad scope of organisational change. Even those with a wealth of experience and skills may struggle to respond adequately to inherently novel situations.
Malmi Amadoru +2 more
wiley +1 more source
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. [PDF]
Achaal B +4 more
europepmc +1 more source

