Results 81 to 90 of about 137,873 (290)

An intelligent cyber threat detection: A swarm-optimized machine learning approach

open access: yesAlexandria Engineering Journal
Cyber threats are an ongoing problem that is hard to prevent completely. This can occur for various reasons, but the main causes are the evolving techniques of hackers and the neglect of security measures when developing software or hardware. As a result,
Issa Qiqieh   +4 more
doaj   +1 more source

A Model-Based Approach to Security Analysis for Cyber-Physical Systems

open access: yes, 2018
Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation.
Bakirtzis, Georgios   +3 more
core   +1 more source

Developing a Framework for the Quality‐Driven Migration to Microservices: A Multi‐Method Design Science Study

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Context The microservices architectural style has revolutionized the way modern software systems are developed and operated. While the development of new microservices systems can leverage a wide range of resources and proven strategies, the migration of an existing monolithic system is not easily generalizable.
Jonas Fritzsch   +6 more
wiley   +1 more source

Cyber terrorism and war, the looming threat to the industrialised state [PDF]

open access: yes, 2011
Earlier this month the EastWest Institute held its second worldwide summit on cyber security. Hundreds of government and industry leaders, from over 43 countries, attended to discuss the looming threat of increasing war and criminality within the cyber ...
Brown, AD
core  

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Cyberterrorism: suatu Tantangan Komunikasi Asimetris Bagi Ketahanan Nasional [PDF]

open access: yes, 2017
Cyberterrorism merupakan aktivitas dan/atau metode yang digunakan oleh sejumlah jaringan atau kelompok teroris. Tidak dapat dipungkiri bahwa dunia maya dan kemajuan teknologi mudah menjadi wadah bagi mereka dalam melakukan aksinya.
A.S, Aa Bambang, Fitriana, I. (Idealisa)
core  

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Cyber security: State of the art, challenges and future directions

open access: yesCyber Security and Applications
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every
Wasyihun Sema Admass   +2 more
doaj   +1 more source

The Challenge of Ensuring Business Security in Information Age [PDF]

open access: yes
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU   +2 more
core  

Assessing Capability Complexity Using Enterprise Architecture Framework

open access: yesSystems Engineering, EarlyView.
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley   +1 more source

Home - About - Disclaimer - Privacy