Results 51 to 60 of about 139,452 (290)

The Cyber Threat Landscape in South Africa: A 10-Year Review

open access: yesThe African Journal of Information and Communication, 2021
The world is witnessing a rise in cyber-related incidents. As information technology improves and the reliance on technology increases, the frequency and severity of cyber incidents escalate.
Heloise Pieterse
doaj   +1 more source

Artificial Intelligence–Driven and Digital Practices for Circular Business and Finance: Insights for Advancing Hubs for Circularity

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The emerging concept of Hubs for Circularity (H4Cs) presents an opportunity to create collaborative, self‐sustaining regional industrial ecosystems that drive circular economy transitions at scale. However, the operationalisation of H4Cs faces financial, organisational and data‐driven challenges.
Aditya Tripathi   +3 more
wiley   +1 more source

Securing electric transportation networks: A machine learning-driven cyber threat detection [PDF]

open access: yesMATEC Web of Conferences
The study examines the cybersecurity environment of electric transportation networks using a machine learning-based methodology. It analyzes the behaviors of electric vehicles, charging patterns, cyber threat occurrences, and the performance of machine ...
Ivanovich Vatin Nikolai, Sundari Rama
doaj   +1 more source

A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]

open access: yes, 2011
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray   +2 more
core   +2 more sources

Digital Technology's Role in Circular Waste Management: A Systematic Review

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Combining circular economy ideas with digital tools offers a game‐changing way to tackle global sustainability problems. This paper focuses on how digital changes and circular economy models link up. A review has been conducted for 112 articles from 2021 to September 2025, using PRISMA‐2020 methodology. This study covered new tech like AI, IoT,
Reza Eslamipoor
wiley   +1 more source

Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database

open access: yesIEEE Access
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for ...
Bader Al-Sada   +2 more
doaj   +1 more source

Cyber Threat Intelligence Platform [PDF]

open access: yes, 2016
Cieľom práce je vytvoriť webovú platformu, ktorá poskytne zjednodušený popis, spracovanie a výmenu bezpečnostných incidentov za pomoci dostupných štandardov STIX, TAXII, CybOX, IDEA.
Jacko, Jerguš
core  

Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid

open access: yes, 2018
Malicious attacks in the power system can eventually result in a large-scale cascade failure if not attended on time. These attacks, which are traditionally classified into \emph{physical} and \emph{cyber attacks}, can be avoided by using the latest and ...
Chung, Hwei-Ming   +5 more
core   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

Home - About - Disclaimer - Privacy