Results 261 to 270 of about 1,175,680 (325)
Some of the next articles are maybe not open access.

Location-Based Schemes for Mitigating Cyber Threats on Connected and Automated Vehicles: A Survey and Design Framework

IEEE transactions on intelligent transportation systems (Print), 2022
The increased automation and connectivity of vehicles and road infrastructure can make future transportation systems more efficient and smarter and enable new transportation business models.
Dajiang Suo   +4 more
semanticscholar   +1 more source

A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry

IEEE transactions on intelligent transportation systems (Print), 2023
Impressive technological advancements over the past decades commenced significant advantages in the maritime industry sector and elevated commercial, operational, and financial benefits.
Imran Ashraf   +6 more
semanticscholar   +1 more source

Best practices in cybersecurity for green building management systems: Protecting sustainable infrastructure from cyber threats

International Journal of Science and Research Archive
This study explores the critical intersection of cybersecurity and sustainable infrastructure, with a focus on Green Building Management Systems (GBMS).
Adebimpe Bolatito   +3 more
semanticscholar   +1 more source

Adversarial Kendall’s Model Towards Containment of Distributed Cyber-Threats

IEEE Transactions on Information Forensics and Security, 2021
This work examines propagation of cyber-threats over networks under an adversarial formulation. Exploiting Kendall’s birth-death-immigration model, we propose an analytical framework to describe the stochastic dynamics of cyber-threat propagation in a ...
P. Addesso   +3 more
semanticscholar   +1 more source

An overview of cyber threats generated by AI

International Journal of Multidisciplinary Sciences and Arts
Artificial intelligence's (AI) quick development has drastically changed cyber security by bringing in both sophisticated cyber threats and cutting-edge defenses.
Aftab Arif   +2 more
semanticscholar   +1 more source

MATHEMATICAL MODEL FOR ASSESSING CYBER THREATS AND INFORMATION IMPACTS IN MICROCONTROLLERS

Information Technology and Computer Engineering
The paper is presents the research materials of the analysis cyber threats and their influences on information processes in microcontrollers (MC). The optimization of the existing mathematical model of cyber threats influences(impacts) on the information
Vadim Malinovskyi   +2 more
semanticscholar   +1 more source

Cyber Threat Migration

2023
‘Globalization,' ‘industrialization,' ‘cyber connectivity,' ‘digitalization,' and ‘e-commerce' are not fantasy words in today's era. They all amalgamated towards the growth and development of every sector in the country. But as on other side of the coin, cyber security is on the verge of serious threats in digital world.
Minhaj Akhtar Usmani   +3 more
openaire   +1 more source

Cyber Security Threats and Countermeasures in Digital Age

Journal of Applied Science and Education (JASE)
Due to the quick development of technology, the digital age has brought with it ad-vantages never before seen, but it has also opened the door to a flood of new cyber security concerns.
Manikant thakur
semanticscholar   +1 more source

A Survey on Network Security for Cyber–Physical Systems: From Threats to Resilient Design

IEEE Communications Surveys and Tutorials, 2022
Cyber-physical systems (CPS) are considered the integration of physical systems in the real world and control software in computing systems. In CPS, the real world and the computing systems are connected through networks with real-time information ...
Sangjun Kim   +2 more
semanticscholar   +1 more source

Cyber Security Threats on Digital Banking

International Conference on Applied Informatics and Communication, 2022
Digital banking is the new form of banking that involves using the internet and mobile applications and excludes the use of pen and paper. One of the main issues that are associated with the form of banking is the presence of several forms of security ...
Haitham M. Alzoubi   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy