Results 11 to 20 of about 1,175,680 (325)

A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. [PDF]

open access: yesSensors (Basel), 2023
Digitization in healthcare systems, with the wid adoption of Electronic Health Records, connected medical devices, software and systems providing efficient healthcare service delivery and management.
Silvestri S   +4 more
europepmc   +2 more sources

A holistic and proactive approach to forecasting cyber threats. [PDF]

open access: yesSci Rep, 2023
Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-matching algorithms help human experts to scan system logs and network traffic for known virus or malware signatures.
Almahmoud Z   +4 more
europepmc   +2 more sources

Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap. [PDF]

open access: yesSensors (Basel), 2021
Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and intelligent factory setup improving manufacturing processes and efficiency.
Dhirani LL, Armstrong E, Newe T.
europepmc   +2 more sources

A Bayesian Framework for the Analysis and Optimal Mitigation of Cyber Threats to Cyber-Physical Systems. [PDF]

open access: yesRisk Anal, 2022
Critical infrastructures are increasingly reliant on information and communications technology (ICT) for more efficient operations, which, at the same time, exposes them to cyber threats.
Żebrowski P, Couce-Vieira A, Mancuso A.
europepmc   +2 more sources

A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things. [PDF]

open access: yesSci Rep
While the proliferation of the Internet of Things (IoT) has revolutionized several industries, it has also created severe data security concerns. The security of these network devices and the dependability of IoT networks depend on efficient threat ...
Ashraf MWA   +5 more
europepmc   +2 more sources

An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities [PDF]

open access: yesApplied Sciences, 2022
A smart city is where existing facilities and services are enhanced by digital technology to benefit people and companies. The most critical infrastructures in this city are interconnected.
Vasiliki Demertzi   +2 more
semanticscholar   +1 more source

Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity

open access: yesSustainability, 2023
Amidst the rapid advancements in the digital landscape, the convergence of digitization and cyber threats presents new challenges for organizational security. This article presents a comprehensive framework that aims to shape the future of cyber security.
Muhammad Fakhrul Safitra   +2 more
semanticscholar   +1 more source

Smart Grid Resilience for Grid-Connected PV and Protection Systems under Cyber Threats

open access: yesSmart Cities, 2023
In recent years, the integration of Distributed Energy Resources (DERs) and communication networks has presented significant challenges to power system control and protection, primarily as a result of the emergence of smart grids and cyber threats.
Feras Alasali   +6 more
semanticscholar   +1 more source

Hybrid nature of modern threats for cybersecurity and information security

open access: yesSmart Cities and Regional Development Journal, 2020
The paper deals with phenomena arising from radical disruptions in numerous spheres of human activity that challenge the conventional understanding of security. Authors endeavour to contribute to understanding of these changes and the emerging paradigm.
Oleksandr TSARUK, Maria KORNIIETS
doaj   +1 more source

Cyber Threats Detection in Smart Environments using SDN-enabled DNN-LSTM Hybrid Framework

open access: yesIEEE Access, 2022
Internet of Things (IoT) is an instantly exacerbated communication technology that is manifesting miraculous effectuation to revolutionize conventional means of network communication.
Mohammad Al Razib   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy