Results 131 to 140 of about 234,523 (279)
Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley +1 more source
Editorial: Human-in-the-loop cyber-physical systems. [PDF]
Yau KA.
europepmc +1 more source
Maximizing the Economic, Environmental, and Social Impact of the Metaverse
ABSTRACT The metaverse is a transformative digital ecosystem with the potential to redefine economic, environmental, and social systems. This qualitative study examines how the metaverse and its enabling technologies—such as AR/VR, blockchain, and AI—might evolve to influence sustainability. Drawing on semi‐structured interviews with global experts and
Alessandro Lanteri +2 more
wiley +1 more source
Physically unclonable function-based authentication is one of the widely accepted and promising hardware security primitives. For security applications, strong PUF circuits can generate a large number of challenge–response pairs (CRPs) for authentication.
Gisha Chittattukara Girijan +4 more
doaj +1 more source
ABSTRACT Understanding innovation policy is pivotal to enhancing national competitiveness for global value chain. This research investigates an SME‐Inclusive public‐private AI innovation network over time in the U.S. context (1991–2023), revealing how a government's demand‐based innovation policy bolsters technological prowess through isomorphism and ...
Jiyoon An
wiley +1 more source
Securing Secrets in Cyber-Physical Systems: A Cutting-Edge Privacy Approach with Consortium Blockchain. [PDF]
Ali A +5 more
europepmc +1 more source
Towards Topology-Free Programming for Cyber-Physical Systems with Process-Oriented Paradigm. [PDF]
Zyubin VE +3 more
europepmc +1 more source
Humans and cyber-physical systems as teammates? Characteristics and applicability of the human-machine-teaming concept in intelligent manufacturing. [PDF]
Bocklisch F, Huchler N.
europepmc +1 more source
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
Security Analysis of Cyber-Physical Systems Using Reinforcement Learning. [PDF]
Ibrahim M, Elhafiz R.
europepmc +1 more source

