Results 41 to 50 of about 74,403 (290)
We present the ‘NoSQL Injection Dataset for MongoDB, a comprehensive collection of data obtained from diverse projects focusing on NoSQL attacks on MongoDB databases.In the present era, we can classify databases into three main types: structured, semi ...
Rameshwar D․ L․ +3 more
doaj +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David +2 more
core +1 more source
Proactive threat detection for connected cars using recursive Bayesian estimation [PDF]
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber ...
al-Khateeb, Haider +4 more
core +3 more sources
A Hybrid Transfer Learning Framework for Brain Tumor Diagnosis
A novel hybrid transfer learning approach for brain tumor classification achieves 99.47% accuracy using magnetic resonance imaging (MRI) images. By combining image preprocessing, ensemble deep learning, and explainable artificial intelligence (XAI) techniques like gradient‐weighted class activation mapping and SHapley Additive exPlanations (SHAP), the ...
Sadia Islam Tonni +11 more
wiley +1 more source
Toward a Unified Understanding of Cyber Resilience: Concepts, Strategies, and Future Directions
In the digital age, the concept of cyber resilience has become a cornerstone for industries aiming to safeguard their operational integrity, data security, and service continuity against the backdrop of an ever-evolving cyber threat landscape. Businesses
Priyanka Verma +4 more
doaj +1 more source
A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray +2 more
core +2 more sources
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
Analysis of Resilience of a Digital Substation Using an Event Tree [PDF]
A digital substation is an example of a cyber-physical system that is a sophisticated system consisting of two closely interrelated subsystems: physical (technological) and information-communication ones.
Kolosok Irina, Korkina Elena
doaj +1 more source
Ensuring secure communication between different zones during armed action is the main goal of this project. The majority of communications take place by wireless (satellite) means because this is the medium that attackers target the most. As such, it is the responsibility of the informing general officer to guarantee a secure communication channel.
null N. Leo Bright Tennisson +3 more
openaire +1 more source

