Results 81 to 90 of about 139,452 (290)
Land Use Transformation and Climate Resilience in Smart Cities: Role of ICT in Modern Urban Planning
ABSTRACT Modern urban planning is experiencing a transition from traditional planning to the integration of information technology, which defines the concept of a “smart city”. The study analyses the evolution of urban planning practices with an emphasis on the role of engineering and architecture in the process of urbanization, the transition to the ...
Dariusz Cichoń
wiley +1 more source
Cyber security picture 2013 [PDF]
Summary: This report summarises cyber intrusion activity identified by or reported to the Cyber Security Operations Centre (CSOC) during 2013. It provides a broad overview of cyber threats to Australian government networks, as observed by the CSOC.
core
Life after herbarium digitisation: Physical and digital collections, curation and use
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton +39 more
wiley +1 more source
Technological Threat Attribution, Trust and Confidence, and the Contestability of National Security Policy [PDF]
The world has been asked to believe that China is a source of cyberthreat and that Russia is meddling in U.S. elections. Western populations are being asked to trust the words of intelligence agencies and world leaders that these unspecified ...
Hoverd, W
core
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ
Проаналізовано заходи із забезпечення кібербезпеки провідних держав світу, виділені основні тенденції трансформації внутрішньої політики держав з огляду на активізацію кіберзагроз у світі. Запропоновано шляхи поліпшення кібербезпекової політики України з
Oleksandr M. Kosohov, Аnatoliy O. Siryk
doaj
Cyber security: State of the art, challenges and future directions
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every
Wasyihun Sema Admass +2 more
doaj +1 more source
ABSTRACT The fifth industrial revolution (I5.0), which is based on the utilization of interconnected data for efficient resource usage in meeting human requirements, proposes efficient solutions to resource constraint situations. However, the transition to I5.0 in the health sector is not easy and has to face several obstacles.
Ajay Jha +5 more
wiley +1 more source
Using the Oldest Military Force for the Newest National Defense
The National Guard is establishing Cyber Mission Teams (CMT) that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions.
Brian Claus +3 more
doaj +1 more source
Data Schema Evolution for the Self‐Adaptive Software Domain: A Systematic Mapping Study
ABSTRACT Context Self‐adaptive Software (SaS) is a special category of software systems that enables adaptation at runtime to address new user requirements or changes in its execution environment. This article focuses on a specific category of SaS named SaS2DB, which encompasses systems that require the storage of data in a database. In short, a SaS2DB
Gabriel Nagassaki Campos +4 more
wiley +1 more source

