Results 151 to 160 of about 278,396 (266)
A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists' Perspective. [PDF]
Mahler T +4 more
europepmc +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation. [PDF]
Cains MG +4 more
europepmc +1 more source
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study. [PDF]
Nweke LO, Bokolo AJ, Mba G, Nwigwe E.
europepmc +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
An intelligent cyber security phishing detection system using deep learning techniques. [PDF]
Mughaid A +5 more
europepmc +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
The Role of User Behaviour in Improving Cyber Security Management. [PDF]
Moustafa AA, Bello A, Maurushat A.
europepmc +1 more source

