Results 91 to 100 of about 137,873 (290)

Using the Oldest Military Force for the Newest National Defense

open access: yesJournal of Strategic Security, 2015
The National Guard is establishing Cyber Mission Teams (CMT) that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions.
Brian Claus   +3 more
doaj   +1 more source

Cyber Threats Identification in the Evolving Digital Reality [PDF]

open access: yes, 2016
Report published in the Proceedings of the National Conference on "Education and Research in the Information Society", Plovdiv, May, 2016Modern web technologies have already become an indispensable part of our everyday life, shaping a new, overlaid tech ...
Minchev, Zlatogor
core  

Maximizing the Economic, Environmental, and Social Impact of the Metaverse

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT The metaverse is a transformative digital ecosystem with the potential to redefine economic, environmental, and social systems. This qualitative study examines how the metaverse and its enabling technologies—such as AR/VR, blockchain, and AI—might evolve to influence sustainability. Drawing on semi‐structured interviews with global experts and
Alessandro Lanteri   +2 more
wiley   +1 more source

СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
Проаналізовано заходи із забезпечення кібербезпеки провідних держав світу, виділені основні тенденції трансформації внутрішньої політики держав з огляду на активізацію кіберзагроз у світі. Запропоновано шляхи поліпшення кібербезпекової політики України з
Oleksandr M. Kosohov, Аnatoliy O. Siryk
doaj  

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Real-Time Automated Cyber Threat Classification and Emerging Threat Detection Framework

open access: yesIEEE Open Journal of the Computer Society
Automating cyber threat intelligence (CTI) collection and analysis in real time is critical for the timely detection and mitigation of cyber threats. Cybersecurity researchers have recently recommended CTI as a proactive and robust method for automated ...
Alemayehu Tilahun Haile   +2 more
doaj   +1 more source

Threat Analysis of Power System Case Study via STRIDE Threat Model in Digital Twin Real-time Platform [PDF]

open access: yesEPJ Web of Conferences
Threat modeling is a pivotal analytical procedure employed to specify the potential threats and select the appropriate security measures. It helps reduce the risk of cyber-attacks that may target several components of the cyber-physical power systems ...
Muhsen Hani   +5 more
doaj   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Bayesian Stackelberg game approach for cyber mission impact assessment

open access: yesICT Express
Cyber threats increasingly target mission-critical systems in the military and private sectors. CMIA has emerged to mitigate such cyber threats and assure the resilience of critical missions.
Donghwan Lee   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy