Results 11 to 20 of about 697,637 (332)

A Survey on Cyber Resilience: Key Strategies, Research Challenges, and Future Directions

open access: yesACM Computing Surveys
Cyber resilience has become a major concern for both academia and industry due to the increasing number of data breaches caused by the expanding attack surface of existing IT infrastructure. Cyber resilience refers to an organisation’s ability to prepare
S. Alhidaifi   +2 more
semanticscholar   +3 more sources

Defending against adversarial attacks on Covid-19 classifier: A denoiser-based approach

open access: yesHeliyon, 2022
Covid-19 has posed a serious threat to the existence of the human race. Early detection of the virus is vital to effectively containing the virus and treating the patients.
Keshav Kansal   +5 more
doaj   +1 more source

ATC Level Tactical Manoeuvring during Descent for Mitigating Impact of ADS-B Message Injection Cyber Attack

open access: yesEngineering Proceedings, 2022
To reduce delays caused by an ADS-B Message Injection attack, we propose an Air Traffic Control (ATC) level tactical manoeuvring framework for maintaining safe flight trajectories while reducing diversion from the original trajectory during the descent ...
Mohd Ruzeiny Kamaruzzaman   +3 more
doaj   +1 more source

Bit Flipping Key Encapsulation for the Post-Quantum Era

open access: yesIEEE Access, 2023
It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the ...
Mohammad Reza Nosouhi   +3 more
doaj   +1 more source

Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems

open access: yesDrones, 2023
In recent years, edge-based intelligent UAV delivery systems have attracted significant interest from both the academic and industrial sectors. One key obstacle faced by these smart UAV delivery systems is data privacy, as they rely on vast amounts of ...
Chengzu Dong   +6 more
doaj   +1 more source

Building Cyber Resilience: Key Factors for Enhancing Organizational Cyber Security

open access: yesJournal of Informatics and Web Engineering, 2023
The increasingly pervasive influence of technology on a global scale, coupled with the accelerating pace of organizations operating in cyberspace, has intensified the need for adequate protection against the risks posed by cyber threats.
Thavaselvi Munusamy, Touraj Khodadi
doaj   +1 more source

Cyber Insurance for Cyber Resilience

open access: yes, 2023
Cyber insurance is a complementary mechanism to further reduce the financial impact on the systems after their effort in defending against cyber attacks and implementing resilience mechanism to maintain the system-level operator even though the attacker is already in the system.
Liu, Shutian, Zhu, Quanyan
openaire   +2 more sources

Cyber Resilience Enabled by Endogenous Safety and Security: Vision, Techniques, and Strategies

open access: yes中国工程科学, 2023
Cyber resiliency engineering is a technical approach embraced by countries and regions such as the United States and Europe to implement digital transformation and address network security challenges under new circumstances.
Wu Jiangxing   +4 more
doaj   +1 more source

STRATEGY MODEL OF CYBER INTELLIGENCE STAKEHOLDERS FOR STRENGTHENING CYBER DEFENSE TO ACHIEVE NATIONAL RESILIENCE [PDF]

open access: yesRussian Journal of Agricultural and Socio-Economic Sciences, 2023
This research aims to analyze the stakeholders of cyber intelligence for strengthening cyber defense to achieve national resilience. This research is important because cyber intelligence stakeholders play a role as policymakers, coordinators ...
Purnomo W.P.   +3 more
doaj   +1 more source

Conceptualizing human resilience in the face of the global epidemiology of cyber attacks [PDF]

open access: yes, 2019
Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global ...
Camp, L. Jean   +5 more
core   +3 more sources

Home - About - Disclaimer - Privacy