Results 131 to 140 of about 278,396 (266)

Developing a Framework for the Quality‐Driven Migration to Microservices: A Multi‐Method Design Science Study

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Context The microservices architectural style has revolutionized the way modern software systems are developed and operated. While the development of new microservices systems can leverage a wide range of resources and proven strategies, the migration of an existing monolithic system is not easily generalizable.
Jonas Fritzsch   +6 more
wiley   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions

open access: yesIEEE Access
Ransomware attacks are on the rise in terms of both frequency and impact. The shift to remote work due to the COVID-19 pandemic has led more people to work online, prompting companies to adapt quickly.
Jamil Ispahany   +3 more
doaj   +1 more source

2. Cyber security [PDF]

open access: yesDigitale Welt, 2017
openaire   +1 more source

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization. [PDF]

open access: yesSensors (Basel), 2022
Alterazi HA   +6 more
europepmc   +1 more source

Metaverse and Artificial Intelligence as Web 4.0: The Next Generation of the Internet

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study utilizes systems thinking to explore and entwine an evolving metaverse scholarship to a relatively underexplored phenomenon of Web 4.0. We adopt a soft systems thinking framework to guide the interpretation of complex and evolving metaverse scholarship, using bibliometric mapping of 5587 publications sourced from Scopus.
Anton Klarin   +3 more
wiley   +1 more source

Motivation and hygiene factors for curriculum (re)development and the embedding of technology in accounting programmes

open access: yesAccounting &Finance, EarlyView., 2023
Abstract Using Herzberg's two‐factor theory, this paper examines the hygiene and motivation factors that drive (re)development in accounting higher education programmes. Interviews with accounting educators and discipline leaders demonstrate a range of factors at play in the (re)development of accounting programmes in pursuit of embedding relevant ...
Esin Ozdil   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy