Results 101 to 110 of about 1,175,680 (325)

Optimization of cyber security through the implementation of AI technologies

open access: yesJournal of Intelligent Systems
Identification of cyber threats is crucial and significant for determining substantial security techniques and approaches. This research illustrates a brief discussion of cyberspace challenges and threats in a disruptive era alongside comprehensive ...
Nawaf Liqaa, Bentotahewa Vibhushinie
doaj   +1 more source

Cyber Threat in Interstate Relations: Case of US-Russia Cyber Tensions

open access: yesPolicy Perspectives, 2018
The 20 th century was overshadowed by conventional military threats, whereas the 21 st century has witnessed the preeminence of non-conventional security threats, including terrorism, transnational crime, civil wars, environmental degeneration and ...
Dr. Muhammad Riaz Shad
doaj   +1 more source

Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]

open access: yes, 2015
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M   +12 more
core  

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Research on Improving Cyber Resilience by Integrating the Zero Trust Security Model With the MITRE ATT&CK Matrix

open access: yesIEEE Access
With the advent of the digital information age, the dynamics of cyberspace are rapidly evolving, resulting in a significant increase in cyber threats. In this paper, we propose to integrate the Zero Trust (ZT) security model and the MITRE ATT&CK ...
Gwanghyun Ahn   +3 more
doaj   +1 more source

Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]

open access: yes, 2016
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core  

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

Cyber–Physical Security Assessment for Maritime Vessels: Study on Drillship DP System Using American Petroleum Institute Security Risk Analysis and Bow-Tie Analysis

open access: yesJournal of Marine Science and Engineering
The maritime industry’s increasing integration of IT/OT systems into vessel operations has significantly elevated its exposure to cyber–physical threats, making the development of effective cyber risk management strategies a necessity.
Iosif Progoulakis   +5 more
doaj   +1 more source

A FRAMEWORK FOR CYBERSECURITY STRATEGY FOR DEVELOPING COUNTRIES: CASE STUDY OF AFGHANISTAN

open access: yesAsia-Pacific Journal of Information Technology and Multimedia, 2015
Given the importance of cyber space for country development, different countries have conducted a lot of investment in cyber space application. Since, based on official documents, Afghanistan is in the process of integrating ICT into its critical ...
Khosraw Salamzada   +2 more
doaj   +1 more source

A Method for Assessing the Risks to Sustainability Posed by Process Operations

open access: yesSustainable Development, EarlyView.
ABSTRACT We present a framework for assessing the risks to sustainability posed by any given set of processes. The objective is to improve sustainability by enabling better decision‐making in policy and business contexts. The framework can be applied to any system of processes where available information supports discovery and quantification of ...
Richard C. Darton, Colin J. Axon
wiley   +1 more source

Home - About - Disclaimer - Privacy