Results 101 to 110 of about 1,175,680 (325)
Optimization of cyber security through the implementation of AI technologies
Identification of cyber threats is crucial and significant for determining substantial security techniques and approaches. This research illustrates a brief discussion of cyberspace challenges and threats in a disruptive era alongside comprehensive ...
Nawaf Liqaa, Bentotahewa Vibhushinie
doaj +1 more source
Cyber Threat in Interstate Relations: Case of US-Russia Cyber Tensions
The 20 th century was overshadowed by conventional military threats, whereas the 21 st century has witnessed the preeminence of non-conventional security threats, including terrorism, transnational crime, civil wars, environmental degeneration and ...
Dr. Muhammad Riaz Shad
doaj +1 more source
Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M +12 more
core
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
With the advent of the digital information age, the dynamics of cyberspace are rapidly evolving, resulting in a significant increase in cyber threats. In this paper, we propose to integrate the Zero Trust (ZT) security model and the MITRE ATT&CK ...
Gwanghyun Ahn +3 more
doaj +1 more source
Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
The maritime industry’s increasing integration of IT/OT systems into vessel operations has significantly elevated its exposure to cyber–physical threats, making the development of effective cyber risk management strategies a necessity.
Iosif Progoulakis +5 more
doaj +1 more source
A FRAMEWORK FOR CYBERSECURITY STRATEGY FOR DEVELOPING COUNTRIES: CASE STUDY OF AFGHANISTAN
Given the importance of cyber space for country development, different countries have conducted a lot of investment in cyber space application. Since, based on official documents, Afghanistan is in the process of integrating ICT into its critical ...
Khosraw Salamzada +2 more
doaj +1 more source
A Method for Assessing the Risks to Sustainability Posed by Process Operations
ABSTRACT We present a framework for assessing the risks to sustainability posed by any given set of processes. The objective is to improve sustainability by enabling better decision‐making in policy and business contexts. The framework can be applied to any system of processes where available information supports discovery and quantification of ...
Richard C. Darton, Colin J. Axon
wiley +1 more source

