Results 1 to 10 of about 697,637 (332)

Guarding Our Vital Systems: A Metric for Critical Infrastructure Cyber Resilience [PDF]

open access: yesSensors
The increased occurrence and severity of cyber-attacks on critical infrastructure have underscored the need to embrace systematic and prospective approaches to resilience.
Muharman Lubis   +3 more
doaj   +3 more sources

Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response. [PDF]

open access: yesSensors (Basel), 2023
In this study, the methodology of cyber-resilience in small and medium-sized organizations (SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware analysis, detection and response using open-source solutions is proposed for ...
Ilca LF, Lucian OP, Balan TC.
europepmc   +2 more sources

Toward a Unified Understanding of Cyber Resilience: Concepts, Strategies, and Future Directions

open access: yesIEEE Access
In the digital age, the concept of cyber resilience has become a cornerstone for industries aiming to safeguard their operational integrity, data security, and service continuity against the backdrop of an ever-evolving cyber threat landscape. Businesses
Priyanka Verma   +4 more
doaj   +2 more sources

Defining a Cyber Resilience Investment Strategy in an Industrial Internet of Things Context [PDF]

open access: yesSensors, 2019
The fourth industrial revolution has brought several risks to factories along with its plethora of benefits. The convergence of new technologies, legacy technologies, information technologies and operational technologies in the same network generates a ...
Juan Francisco Carías   +3 more
doaj   +2 more sources

Cyber resilience conceptual model for European Union NIS2 standards implementation in Slovakia [PDF]

open access: yesScientific Reports
The use of modern information and communication technologies in the business environment, as well as in everyday life has become common. However, with the dynamic development of these technologies, the risk of their abuse is also increasing.
Jozef Ristvej   +5 more
doaj   +2 more sources

Cyber resilience and cyber security issues of intelligent cloud computing systems

open access: yesResults in Control and Optimization, 2023
It is necessary to provide the cyber security of cloud computing according to the components that constitute its structure. The first step in advancing the cyber security of this technology is to accurately identify its threats.
Fargana Abdullayeva
doaj   +2 more sources

The relationship between digital technostress and cyber moral disengagement among college students: a moderated mediation model of psychological resilience, self-efficacy, and online self-control [PDF]

open access: yesFrontiers in Psychology
This study explores the relationship between digital technostress and cyber moral disengagement among college students, with a particular focus on the mediating role of psychological resilience, self-efficacy, and the moderating role of online self ...
Ruyan Hu   +5 more
doaj   +2 more sources

Risk Assessment for Cyber Resilience of Critical Infrastructures: Methods, Governance, and Standards

open access: yesApplied Sciences
As future infrastructures increasingly rely on digital systems, their exposure to cyber threats has grown significantly. The complex and hyper-connected nature of these systems presents challenges for enhancing cyber resilience against adverse conditions,
Ali Aghazadeh Ardebili   +2 more
doaj   +2 more sources

Cyber Resilience Limitations in Space Systems Design Process: Insights from Space Designers

open access: yesSystems
Space technology is integral to modern critical systems, including navigation, communication, weather, financial services, and defence. Despite its significance, space infrastructure faces unique cyber resilience challenges exacerbated by the size ...
Syed Shahzad   +4 more
doaj   +2 more sources

Mitigation of ADS-B Spoofing Attack Impact on Departure Sequencing Through Modulated Synchronous Taxiing Approach

open access: yesIEEE Open Journal of Intelligent Transportation Systems, 2023
Apart from delay to flight arrivals, occurrence of ghost aircraft from ADS-B message injection attack will also cause delay to the departure operations.
Mohd Ruzeiny Kamaruzzaman   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy