CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain
In the current context of the wide application of Internet of Things (IoT) technology, cross-domain data sharing based on industrial IoT (IIoT) has become the key to maximizing data value, but it also faces many challenges.
Jiahui Jiang +3 more
doaj +1 more source
Navigating the Twin Transformation: How Digitalization and Sustainability Shape the Future
ABSTRACT Amid growing societal and scholarly interest in the interplay between sustainability transformation (ST) and digital transformation (DT), this study conducts a systematic literature review to advance the understanding of twin transformation (TT). Analyzing 65 peer‐reviewed articles, this review makes three key contributions: (1) It synthesizes
Jonas Hammerschmidt +4 more
wiley +1 more source
Analysis of cyber security knowledge gaps based on cyber security body of knowledge. [PDF]
Catal C, Ozcan A, Donmez E, Kasif A.
europepmc +1 more source
Cyber-Physical Industrial Control System Testbed: A Cyber-Security Solution [PDF]
Mohammad Nourizadeh +3 more
openalex +1 more source
Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data [PDF]
Anil V. Turukmane, Ganesh Khekare
openalex +1 more source
The Application of a Cost Management System Within the Changing Dynamics of Organisations
ABSTRACT Contingency theory suggests that cost‐management systems (CMS) must be aligned with organizational and environmental characteristics; however, empirical evidence remains fragmented and is drawn largely from advanced economies. It remains unclear whether the importance of specific contingent factors varies when digital infrastructure, capital ...
Padmi Nagirikandalage +5 more
wiley +1 more source
Named Entity Recognition Model Based on the Fusion of Word Vectors and Category Vectors
Named entity recognition (NER) in deep learning mode heavily relies on the processing and analysis of text vectors. This paper introduces an NER model based on deep learning techniques, emphasizing the fusion of word vectors and category vectors to ...
Yang Zhou +3 more
doaj +1 more source
Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems. [PDF]
Smrčka A +9 more
europepmc +1 more source
Beyond the Castle Model of cyber-risk and cyber-security [PDF]
Christian Leuprecht +2 more
openalex +1 more source

