Results 111 to 120 of about 1,175,680 (325)

Strategy of the higher educations of Ukraine in training of experts on informational and cyber security [PDF]

open access: yes, 2018
In October 2017 the European Council again called the attention and assigned the task to enhance the cyber security actions within EU countries. The provided regulations underline the necessity in joint actions to combat cybercrimes.
Borsukovska, Viktoriia   +2 more
core  

Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives

open access: yesSmall, EarlyView.
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray   +7 more
wiley   +1 more source

THE EVOLUTION OF NATO’S CYBER SECURITY POLICY AND FUTURE PROSPECTS [PDF]

open access: yesJournal of Defense Resources Management, 2019
While the future landscape of cyberspace is becoming quite complicated, NATO must define the potential threats and adapt its strategy to these challenges.
Arif Hasan HASANOV   +2 more
doaj  

Cyber threats confronting the digital built environment

open access: yesEngineering Construction and Architectural Management, 2019
Purpose Smart cities provide fully integrated and networked connectivity between virtual/digital assets and physical building/infrastructure assets to form digital economies.
Erika Parn, D. Edwards
semanticscholar   +1 more source

Selective Wettability–Driven Evaporation‐Enhanced Redox Cycling for Robust and Ultrasensitive Detection of Viral Particles

open access: yesSmall Methods, EarlyView.
ABSTRACT Timely detection of viral infections, particularly in settings outside centralized laboratories, is essential for controlling outbreaks. Small electrochemical biosensors are appealing because they are fast, require microliter sample volumes, and can be integrated into portable devices.
Pouya Soltan Khamsi   +3 more
wiley   +1 more source

Automating Attack and Defense Strategies in Cybersecurity [PDF]

open access: yesInformatică economică
Given the ongoing development and variety of cyber threats, there is a growing urgency for a proactive and efficient approach to IT security. This article presents a novel approach to automating cyber security attack and defense techniques by using ...
Ionut LATES, Catalin BOJA
doaj   +1 more source

Systematic Approach to Cyber Resilience Operationalization in SMEs

open access: yesIEEE Access, 2020
The constantly evolving cyber threat landscape is a latent problem for today's companies. This is especially true for the Small and Medium-sized Enterprises (SMEs) because they have limited resources to face the threats but, as a group, represent an ...
Juan Francisco Carias   +4 more
doaj   +1 more source

The Australian Cyber Security Centre threat report 2015 [PDF]

open access: yes
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for
Australian Cyber Security Centre
core  

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy