Results 101 to 110 of about 278,396 (266)

CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain

open access: yesInformation
In the current context of the wide application of Internet of Things (IoT) technology, cross-domain data sharing based on industrial IoT (IIoT) has become the key to maximizing data value, but it also faces many challenges.
Jiahui Jiang   +3 more
doaj   +1 more source

Planning for the Future of Cyber Attack Attribution : Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology, 111th Cong., July 15, 2010 (Statement by Adjunct Professor Marc Rotenberg, Geo. U. L. Center) [PDF]

open access: yes, 2010
Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr.
Rotenberg, Marc
core   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems. [PDF]

open access: yesOpen Res Eur, 2023
Smrčka A   +9 more
europepmc   +1 more source

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

Named Entity Recognition Model Based on the Fusion of Word Vectors and Category Vectors

open access: yesIEEE Access
Named entity recognition (NER) in deep learning mode heavily relies on the processing and analysis of text vectors. This paper introduces an NER model based on deep learning techniques, emphasizing the fusion of word vectors and category vectors to ...
Yang Zhou   +3 more
doaj   +1 more source

What changed in the cyber-security after COVID-19? [PDF]

open access: yesComput Secur, 2022
Kumar R, Sharma S, Vachhani C, Yadav N.
europepmc   +1 more source

Archetypes of SME Resilience: A Systematic Literature Review of Antecedents, Types and Outcomes of Resilience in SMEs

open access: yesStrategic Change, EarlyView.
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode   +3 more
wiley   +1 more source

In-Vehicle Communication Cyber Security: Challenges and Solutions. [PDF]

open access: yesSensors (Basel), 2022
Rathore RS   +3 more
europepmc   +1 more source

Land Use Transformation and Climate Resilience in Smart Cities: Role of ICT in Modern Urban Planning

open access: yesLand Degradation &Development, EarlyView.
ABSTRACT Modern urban planning is experiencing a transition from traditional planning to the integration of information technology, which defines the concept of a “smart city”. The study analyses the evolution of urban planning practices with an emphasis on the role of engineering and architecture in the process of urbanization, the transition to the ...
Dariusz Cichoń
wiley   +1 more source

Home - About - Disclaimer - Privacy