Results 41 to 50 of about 140,490 (288)

From cyber-security deception to manipulation and gratification through gamification [PDF]

open access: yes, 2019
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3].
DM Buss   +8 more
core   +4 more sources

Toward Environmentally Friendly Hydrogel‐Based Flexible Intelligent Sensor Systems

open access: yesAdvanced Intelligent Discovery, EarlyView.
This review summarizes environmentally and biologically friendly hydrogel‐based flexible sensor systems focusing on physical, chemical, and physiological sensors. Furthermore, device concepts moving forward for the practical application are discussed about wireless integration, the interface between hydrogel and dry electronics, automatic data analysis
Sudipta Kumar Sarkar, Kuniharu Takei
wiley   +1 more source

Cyber Threats Against the North Atlantic Treaty Organization (NATO) and Selected Responses

open access: yesİstanbul Gelişim Üniversitesi Sosyal Bilimler Dergisi, 2014
This article focuses on the disparate cyber threats against the North Atlantic Treaty Organization (NATO), its members, and selected NATO responses to such perils.
Dean Alexander
doaj   +1 more source

Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure

open access: yesApplied Sciences, 2021
As a new area of technology, the Internet of Things (IoT) is a flagship and promising paradigm for innovating society. However, IoT-based critical infrastructures are an appealing target for cybercriminals.
Amir Djenna   +2 more
doaj   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Your employees: the front line in cyber security [PDF]

open access: yes, 2016
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core  

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Is the well‐known phrase ‘small is beautiful’ true of small transnational education institutions?

open access: yesBritish Educational Research Journal, EarlyView.
Abstract The purpose of this research is to consider the potential attractiveness of operating a small international branch campus (IBC). Drawing upon resource‐based and legitimacy theories, we examine the strengths, weaknesses, opportunities and threats associated with the business model that is based on having a small institution size.
Stephen Wilkins, Joe Hazzam
wiley   +1 more source

Cyber Threat Intelligence [PDF]

open access: yes, 2018
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices.
Dehghantanha A., Conti M., Dargahi T.
openaire   +2 more sources

Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data

open access: yesApplied Sciences, 2022
Cyber attacks have increased in frequency in recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation of such threats.
Lucas José Borges Amaro   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy