Results 51 to 60 of about 141,441 (275)

An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks

open access: yes, 2020
We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive ...
Karafili, Erisa   +2 more
core   +1 more source

Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds

open access: yesThe Anatomical Record, EarlyView.
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen   +10 more
wiley   +1 more source

A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems

open access: yesApplied Sciences, 2021
A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network.
Sangjun Kim, Kyung-Joon Park
doaj   +1 more source

The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi   +3 more
wiley   +1 more source

A Survey on Power Grid Cyber Security: From Component-Wise Vulnerability Assessment to System-Wide Impact Analysis

open access: yesIEEE Access, 2018
The now ubiquitous use of information technology poses a crucial challenge to the cyber security of power grid operations, one that has aroused serious concerns from both industry and academia.
Xiaoge Huang, Zhijun Qin, Hui Liu
doaj   +1 more source

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

open access: yes, 2019
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail   +3 more
core   +1 more source

Tokenism or Catalytic? Exploring Board Gender Diversity Through the Lens of SDG 9 Outcomes in the EU Context

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza   +2 more
wiley   +1 more source

Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation

open access: yesBaltic Journal of European studies, 2019
This article explores how cyber-attacks affect freedom of expression. It begins by outlining the literature on cyber coercion and exploring other conceptions of how offensive cyber operations have been used to shape adversary behaviour, including efforts
Burton Joe
doaj   +1 more source

Cyber security and the unexplored threat to global health: a call for global norms

open access: yesGlobal Security: Health, Science and Policy, 2020
Cyber-attacks against hospitals, medical devices, and healthcare entities are becoming increasingly common; simultaneously, physical attacks against hospitals and healthcare entities are increasing. The purpose of this article is to explore the threat to
Rose Bernard   +2 more
doaj   +1 more source

Cyber-Attack Attributes [PDF]

open access: yesTechnology Innovation Management Review, 2014
Senior corporate executives, government officials, and academics have become aware that there are: i) serious financial and regulatory costs arising from cyber-attacks (Pearson, 2014; Sugarman, 2014; US Securities and Exchange Commission, 2014); ii) vulnerabilities in high-value assets such as supervisory-control and dataacquisition systems (Ashford ...
openaire   +1 more source

Home - About - Disclaimer - Privacy