Results 101 to 110 of about 288,624 (313)

Cyber Security [PDF]

open access: yesThe 5th Conference on Information and Knowledge Technology, 2013
  +6 more sources

CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain

open access: yesInformation
In the current context of the wide application of Internet of Things (IoT) technology, cross-domain data sharing based on industrial IoT (IIoT) has become the key to maximizing data value, but it also faces many challenges.
Jiahui Jiang   +3 more
doaj   +1 more source

Navigating the Twin Transformation: How Digitalization and Sustainability Shape the Future

open access: yesStrategic Change, EarlyView.
ABSTRACT Amid growing societal and scholarly interest in the interplay between sustainability transformation (ST) and digital transformation (DT), this study conducts a systematic literature review to advance the understanding of twin transformation (TT). Analyzing 65 peer‐reviewed articles, this review makes three key contributions: (1) It synthesizes
Jonas Hammerschmidt   +4 more
wiley   +1 more source

Analysis of cyber security knowledge gaps based on cyber security body of knowledge. [PDF]

open access: yesEduc Inf Technol (Dordr), 2023
Catal C, Ozcan A, Donmez E, Kasif A.
europepmc   +1 more source

Cyber-Physical Industrial Control System Testbed: A Cyber-Security Solution [PDF]

open access: bronze, 2020
Mohammad Nourizadeh   +3 more
openalex   +1 more source

The Application of a Cost Management System Within the Changing Dynamics of Organisations

open access: yesStrategic Change, EarlyView.
ABSTRACT Contingency theory suggests that cost‐management systems (CMS) must be aligned with organizational and environmental characteristics; however, empirical evidence remains fragmented and is drawn largely from advanced economies. It remains unclear whether the importance of specific contingent factors varies when digital infrastructure, capital ...
Padmi Nagirikandalage   +5 more
wiley   +1 more source

Named Entity Recognition Model Based on the Fusion of Word Vectors and Category Vectors

open access: yesIEEE Access
Named entity recognition (NER) in deep learning mode heavily relies on the processing and analysis of text vectors. This paper introduces an NER model based on deep learning techniques, emphasizing the fusion of word vectors and category vectors to ...
Yang Zhou   +3 more
doaj   +1 more source

Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems. [PDF]

open access: yesOpen Res Eur, 2023
Smrčka A   +9 more
europepmc   +1 more source

Beyond the Castle Model of cyber-risk and cyber-security [PDF]

open access: gold, 2016
Christian Leuprecht   +2 more
openalex   +1 more source

Home - About - Disclaimer - Privacy