Results 61 to 70 of about 697,637 (332)

Implementing Indigenous Data Sovereignty in Australia: A Five‐Phase Framework for Indigenous Data Governance

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article presents the development of a five‐phase Indigenous Data Governance (IDGov) Framework in Australia, focusing on partnerships between the Aboriginal Community Controlled Health Organisation (ACCHO) sector and non‐Indigenous health entities.
Jacob Prehn   +4 more
wiley   +1 more source

Analysis of Resilience of a Digital Substation Using an Event Tree [PDF]

open access: yesEPJ Web of Conferences, 2019
A digital substation is an example of a cyber-physical system that is a sophisticated system consisting of two closely interrelated subsystems: physical (technological) and information-communication ones.
Kolosok Irina, Korkina Elena
doaj   +1 more source

Tracing the evolution of cyber resilience: a historical and conceptual review

open access: yesInternational Journal of Information Security
In 2000, during a time when cyber security research was focused on the risks and threats posed by digital systems, the notion of being able to withstand and recover from cyber attacks, also known as cyber resilience, emerged.
V. Tzavara, Savvas Vassiliadis
semanticscholar   +1 more source

Magnetic Field‐Modulated Boolean Logic in Proteinoid‐ Fe3 O4 Hybrid Materials

open access: yesAdvanced Physics Research, EarlyView.
Proteinoid‐Fe3O4${\rm Fe}_3{\rm O}_4$. nanoparticle composites exhibit spontaneous electrical oscillations that emulate Boolean logic gates (AND, OR, XOR, NAND, NOR, NOT) under magnetic field modulation. External fields of 65.103 mT tune oscillatory behavior: 84 mT enhances amplitude while 103 mT suppresses it.
Panagiotis Mougkogiannis   +1 more
wiley   +1 more source

Towards quantum‐secure software defined networks

open access: yesIET Quantum Communication
The evolution of quantum computers is considered a serious threat to public‐key cryptosystems (e.g. RSA, ECDSA, ECDH, etc.). This is indeed a big concern for security of the Internet and other data communication and storage systems.
Mohammad Reza Nosouhi   +4 more
doaj   +1 more source

Resilience assessment methodologies and enhancement strategies of multi‐energy cyber‐physical systems of the distribution network

open access: yesIET Energy Systems Integration, 2022
Natural disasters and cyber intrusions threaten the normal operation of the critical Multi‐Energy Systems (MESs) infrastructures. There is still no universally‐accepted definition of MESs resilience under the integration of cyber and physical, and lack ...
Baijie Yang   +4 more
doaj   +1 more source

Cyber resilience revisited: Law and international relations

open access: yesJournal of Social Studies, 2022
Cyber space is increasingly playing an important role in the global world, affecting the pattern of relations between countries. The issue of non-traditional security threats is shifting towards the threat typology associated with cyber space.
Ika Riswanti Putranti   +3 more
doaj   +1 more source

Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics

open access: yes, 2014
Moving Target Defense (MTD) can enhance the resilience of cyber systems against attacks. Although there have been many MTD techniques, there is no systematic understanding and {\em quantitative} characterization of the power of MTD.
Han, Yujuan, Lu, Wenlian, Xu, Shouhuai
core   +1 more source

Cyber Resilience in Digital Marketing Within the Framework of Sustainable Management

open access: yesSustainability
The increasing reliance on information and communication technologies (ICTs), particularly the Internet, in digital marketing systems has made them prime targets for cyberattacks.
Bora Gündüzyeli
semanticscholar   +1 more source

A human-centred design approach for the development and conducting of maritime cyber resilience training

open access: yesWMU Journal of Maritime Affairs (JoMA), 2023
Due to the increase in the digitalization on board ships, the potential consequences of a cyber-induced incident can threaten the safety of the ships. A known challenge in the maritime industry is communication between ship owner management onshore and ...
E. Erstad   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy