Results 1 to 10 of about 74,304 (191)

Defining a Cyber Resilience Investment Strategy in an Industrial Internet of Things Context [PDF]

open access: yesSensors, 2019
The fourth industrial revolution has brought several risks to factories along with its plethora of benefits. The convergence of new technologies, legacy technologies, information technologies and operational technologies in the same network generates a ...
Juan Francisco Carías   +3 more
doaj   +2 more sources

Guarding Our Vital Systems: A Metric for Critical Infrastructure Cyber Resilience [PDF]

open access: yesSensors
The increased occurrence and severity of cyber-attacks on critical infrastructure have underscored the need to embrace systematic and prospective approaches to resilience.
Muharman Lubis   +3 more
doaj   +2 more sources

Cyber resilience conceptual model for European Union NIS2 standards implementation in Slovakia [PDF]

open access: yesScientific Reports
The use of modern information and communication technologies in the business environment, as well as in everyday life has become common. However, with the dynamic development of these technologies, the risk of their abuse is also increasing.
Jozef Ristvej   +5 more
doaj   +2 more sources

The relationship between digital technostress and cyber moral disengagement among college students: a moderated mediation model of psychological resilience, self-efficacy, and online self-control [PDF]

open access: yesFrontiers in Psychology
This study explores the relationship between digital technostress and cyber moral disengagement among college students, with a particular focus on the mediating role of psychological resilience, self-efficacy, and the moderating role of online self ...
Ruyan Hu   +5 more
doaj   +2 more sources

Mitigation of ADS-B Spoofing Attack Impact on Departure Sequencing Through Modulated Synchronous Taxiing Approach

open access: yesIEEE Open Journal of Intelligent Transportation Systems, 2023
Apart from delay to flight arrivals, occurrence of ghost aircraft from ADS-B message injection attack will also cause delay to the departure operations.
Mohd Ruzeiny Kamaruzzaman   +3 more
doaj   +1 more source

Defending against adversarial attacks on Covid-19 classifier: A denoiser-based approach

open access: yesHeliyon, 2022
Covid-19 has posed a serious threat to the existence of the human race. Early detection of the virus is vital to effectively containing the virus and treating the patients.
Keshav Kansal   +5 more
doaj   +1 more source

ATC Level Tactical Manoeuvring during Descent for Mitigating Impact of ADS-B Message Injection Cyber Attack

open access: yesEngineering Proceedings, 2022
To reduce delays caused by an ADS-B Message Injection attack, we propose an Air Traffic Control (ATC) level tactical manoeuvring framework for maintaining safe flight trajectories while reducing diversion from the original trajectory during the descent ...
Mohd Ruzeiny Kamaruzzaman   +3 more
doaj   +1 more source

Bit Flipping Key Encapsulation for the Post-Quantum Era

open access: yesIEEE Access, 2023
It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the ...
Mohammad Reza Nosouhi   +3 more
doaj   +1 more source

Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems

open access: yesDrones, 2023
In recent years, edge-based intelligent UAV delivery systems have attracted significant interest from both the academic and industrial sectors. One key obstacle faced by these smart UAV delivery systems is data privacy, as they rely on vast amounts of ...
Chengzu Dong   +6 more
doaj   +1 more source

Building Cyber Resilience: Key Factors for Enhancing Organizational Cyber Security

open access: yesJournal of Informatics and Web Engineering, 2023
The increasingly pervasive influence of technology on a global scale, coupled with the accelerating pace of organizations operating in cyberspace, has intensified the need for adequate protection against the risks posed by cyber threats.
Thavaselvi Munusamy, Touraj Khodadi
doaj   +1 more source

Home - About - Disclaimer - Privacy