Results 31 to 40 of about 137,873 (290)
Rekonstruksi Pembentukan National Cyber Defense Sebagai Upaya Mempertahankan Kedaulatan Negara [PDF]
Kecemasan terhadap cyber crime telah menjadi perhatian dunia, namun tidak semua negara di dunia ini memberikan perhatian yang lebih besar terhadap masalah cyber crime dan memiliki peraturannya kecuali negara-negara maju dan beberapa negara berkembang ...
Sa\u27diyah, N. K. (Nur) +1 more
core +3 more sources
BackgroundCyber defense decision-making during cyber threat situations is based on human-to-human communication aiming to establish a shared cyber situational awareness.
Torvald F. Ask +12 more
doaj +1 more source
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and ...
Habib El Amin +4 more
doaj +1 more source
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure [PDF]
Cyber-attack is one of the significant threats affecting to any organisation specifically to the Critical Infrastructure (CI) organisation. These attacks are nowadays more sophisticated, multi-vectored and less predictable, which make the Cyber Security ...
Halima Kure, Shareeful Islam
doaj +3 more sources
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source
This study explores the intricate relationship between South Africa's democratic political system, its commitment to human and private rights, and the development of its cybersecurity framework, strategy, and response to cyber threats. Given the country'
Venencia Paidamoyo Nyambuya +1 more
doaj +1 more source
STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION
In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects. This study examines the emergence of cyber issues as a new threat to state security.
Miftah Farid, Ajeng Ayu Adhisty
doaj +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M +12 more
core
Toward Environmentally Friendly Hydrogel‐Based Flexible Intelligent Sensor Systems
This review summarizes environmentally and biologically friendly hydrogel‐based flexible sensor systems focusing on physical, chemical, and physiological sensors. Furthermore, device concepts moving forward for the practical application are discussed about wireless integration, the interface between hydrogel and dry electronics, automatic data analysis
Sudipta Kumar Sarkar, Kuniharu Takei
wiley +1 more source

