Results 121 to 130 of about 74,403 (290)

An Endogenous Security-Oriented Framework for Cyber Resilience Assessment in Critical Infrastructures

open access: yesApplied Sciences
In the face of escalating cyber threats to critical infrastructures, achieving robust cyber resilience has become paramount. This paper proposes an endogenous security-oriented framework for cyber resilience assessment, specifically tailored for critical
Mingyu Luo   +4 more
doaj   +1 more source

Addressing Complexity in System of Systems With GraphRAG: An AI‐Driven Framework for Dynamic Data Integration

open access: yesSystems Engineering, EarlyView.
ABSTRACT System of Systems (SoS) environments are inherently complex, involving numerous operationally and managerially independent component systems with hidden interdependencies and frequent interactions based on unstructured data. In this paper, we propose using graphical Retrieval‐Augmented Generation (GraphRAG), a tool that combines large language
Yinchien Huang   +2 more
wiley   +1 more source

Cyber Dating Abuse Among Spanish Emerging Adults: The Moderating Role of Resilience in the Association Between Perpetration and Victimization

open access: yesSAGE Open
Cyber dating abuse is a significant issue among emerging adults, with harmful implications for both victims and perpetrators. This study had two main objectives: first, to validate previous findings regarding the association between victimization and ...
Beatriz Víllora   +3 more
doaj   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Banking on resilience: 20 years of cybersecurity evolution

open access: yesSouth African Journal of Information Management
Background: The rise in cyberattacks, particularly targeting financial institutions, poses significant risks. A shift towards cyber threat resilience, emphasising proactive strategies for recovery and adaptation, is essential.
Ntokozo F. Miya, Nazeer Joseph
doaj   +1 more source

A Systems Engineering Methodology for System of Autonomous Systems: Test and Evaluation

open access: yesSystems Engineering, EarlyView.
ABSTRACT Recent advances in artificial intelligence and machine learning (AI/ML) have resulted in autonomous systems that reduce operators' workload and involvement in hazardous missions. Integrating these systems into an existing system of systems (SoS) can evolve it into a system of autonomous system (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley   +1 more source

Safety Science as a Source of Organizational Cyber Resilience in Incident Response

open access: yesIEEE Access
This paper presents a scoping review of how safety science is being applied in Incident Response (IR) to improve organisational cyber resilience.
Haula Sani Galadima   +3 more
doaj   +1 more source

Towards a Layered Architectural View for Security Analysis in SCADA Systems

open access: yes, 2012
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong   +2 more
core  

Assessing Capability Complexity Using Enterprise Architecture Framework

open access: yesSystems Engineering, EarlyView.
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy