Results 31 to 40 of about 140,490 (288)
Cyber Warfare and National Security
This study aims to provide insights into cyber threats as a new form of conflict, their regulation under international law, and the potential measures that nations, particularly China, can adopt to mitigate their harmful consequences.
Khoirunnisa Khoirunnisa +4 more
doaj +1 more source
The subject of this study is to ensure the cybersecurity of systems of multifunctional UAV fleets (SMF UAV). The purpose of this study is to identify and analyze the risks associated with the cybersecurity of multi-functional UAV fleets, develop models ...
Heorhii Zemlianko, Vyacheslav Kharchenko
doaj +1 more source
Automated Cyber and Privacy Risk Management Toolkit
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic ...
Gustavo Gonzalez-Granadillo +8 more
doaj +1 more source
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of ...
Faga Hemen Philip
doaj +1 more source
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
In this paper, we present secondary research on recommended cybersecurity practices for social media users from the user’s point of view. Through following a structured methodological approach of the systematic literature review presented, aspects ...
Thilini B. G. Herath +2 more
doaj +1 more source
Tracking advanced persistent threats in critical infrastructures through opinion dynamics [PDF]
Advanced persistent threats pose a serious issue for modern industrial environments, due to their targeted and complex attack vectors that are difficult to detect.
A Lemay +10 more
core +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
CYBER SECURITY IN TRANSPORTATION
The fast pace of scientific and technological progress in terms of informatisation and digitalisation of society entails the risk of increasing cyber threats, which pose a serious problem for organisations, as the pace of development of digital and ...
Olga V. Knyazkina +3 more
doaj +1 more source
Predicting Cyber Events by Leveraging Hacker Sentiment
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Deb, Ashok +2 more
core +1 more source

