Results 81 to 90 of about 139,452 (290)

Land Use Transformation and Climate Resilience in Smart Cities: Role of ICT in Modern Urban Planning

open access: yesLand Degradation &Development, EarlyView.
ABSTRACT Modern urban planning is experiencing a transition from traditional planning to the integration of information technology, which defines the concept of a “smart city”. The study analyses the evolution of urban planning practices with an emphasis on the role of engineering and architecture in the process of urbanization, the transition to the ...
Dariusz Cichoń
wiley   +1 more source

Cyber security picture 2013 [PDF]

open access: yes
Summary: This report summarises cyber intrusion activity identified by or reported to the Cyber Security Operations Centre (CSOC) during 2013. It provides a broad overview of cyber threats to Australian government networks, as observed by the CSOC.

core  

Life after herbarium digitisation: Physical and digital collections, curation and use

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton   +39 more
wiley   +1 more source

Technological Threat Attribution, Trust and Confidence, and the Contestability of National Security Policy [PDF]

open access: yes, 2018
The world has been asked to believe that China is a source of cyberthreat and that Russia is meddling in U.S. elections. Western populations are being asked to trust the words of intelligence agencies and world leaders that these unspecified ...
Hoverd, W
core  

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
Проаналізовано заходи із забезпечення кібербезпеки провідних держав світу, виділені основні тенденції трансформації внутрішньої політики держав з огляду на активізацію кіберзагроз у світі. Запропоновано шляхи поліпшення кібербезпекової політики України з
Oleksandr M. Kosohov, Аnatoliy O. Siryk
doaj  

Cyber security: State of the art, challenges and future directions

open access: yesCyber Security and Applications
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every
Wasyihun Sema Admass   +2 more
doaj   +1 more source

Industry 5.0 for Sustainable Healthcare Services: Analyzing the Prospects and Obstacles for the Indian Healthcare System

open access: yesSustainable Development, EarlyView.
ABSTRACT The fifth industrial revolution (I5.0), which is based on the utilization of interconnected data for efficient resource usage in meeting human requirements, proposes efficient solutions to resource constraint situations. However, the transition to I5.0 in the health sector is not easy and has to face several obstacles.
Ajay Jha   +5 more
wiley   +1 more source

Using the Oldest Military Force for the Newest National Defense

open access: yesJournal of Strategic Security, 2015
The National Guard is establishing Cyber Mission Teams (CMT) that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions.
Brian Claus   +3 more
doaj   +1 more source

Data Schema Evolution for the Self‐Adaptive Software Domain: A Systematic Mapping Study

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Context Self‐adaptive Software (SaS) is a special category of software systems that enables adaptation at runtime to address new user requirements or changes in its execution environment. This article focuses on a specific category of SaS named SaS2DB, which encompasses systems that require the storage of data in a database. In short, a SaS2DB
Gabriel Nagassaki Campos   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy