Results 1 to 10 of about 74,304 (191)
Defining a Cyber Resilience Investment Strategy in an Industrial Internet of Things Context [PDF]
The fourth industrial revolution has brought several risks to factories along with its plethora of benefits. The convergence of new technologies, legacy technologies, information technologies and operational technologies in the same network generates a ...
Juan Francisco Carías +3 more
doaj +2 more sources
Guarding Our Vital Systems: A Metric for Critical Infrastructure Cyber Resilience [PDF]
The increased occurrence and severity of cyber-attacks on critical infrastructure have underscored the need to embrace systematic and prospective approaches to resilience.
Muharman Lubis +3 more
doaj +2 more sources
Cyber resilience conceptual model for European Union NIS2 standards implementation in Slovakia [PDF]
The use of modern information and communication technologies in the business environment, as well as in everyday life has become common. However, with the dynamic development of these technologies, the risk of their abuse is also increasing.
Jozef Ristvej +5 more
doaj +2 more sources
The relationship between digital technostress and cyber moral disengagement among college students: a moderated mediation model of psychological resilience, self-efficacy, and online self-control [PDF]
This study explores the relationship between digital technostress and cyber moral disengagement among college students, with a particular focus on the mediating role of psychological resilience, self-efficacy, and the moderating role of online self ...
Ruyan Hu +5 more
doaj +2 more sources
Apart from delay to flight arrivals, occurrence of ghost aircraft from ADS-B message injection attack will also cause delay to the departure operations.
Mohd Ruzeiny Kamaruzzaman +3 more
doaj +1 more source
Defending against adversarial attacks on Covid-19 classifier: A denoiser-based approach
Covid-19 has posed a serious threat to the existence of the human race. Early detection of the virus is vital to effectively containing the virus and treating the patients.
Keshav Kansal +5 more
doaj +1 more source
To reduce delays caused by an ADS-B Message Injection attack, we propose an Air Traffic Control (ATC) level tactical manoeuvring framework for maintaining safe flight trajectories while reducing diversion from the original trajectory during the descent ...
Mohd Ruzeiny Kamaruzzaman +3 more
doaj +1 more source
Bit Flipping Key Encapsulation for the Post-Quantum Era
It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the ...
Mohammad Reza Nosouhi +3 more
doaj +1 more source
In recent years, edge-based intelligent UAV delivery systems have attracted significant interest from both the academic and industrial sectors. One key obstacle faced by these smart UAV delivery systems is data privacy, as they rely on vast amounts of ...
Chengzu Dong +6 more
doaj +1 more source
Building Cyber Resilience: Key Factors for Enhancing Organizational Cyber Security
The increasingly pervasive influence of technology on a global scale, coupled with the accelerating pace of organizations operating in cyberspace, has intensified the need for adequate protection against the risks posed by cyber threats.
Thavaselvi Munusamy, Touraj Khodadi
doaj +1 more source

