Results 61 to 70 of about 142,803 (291)

An analysis of security issues in building automation systems [PDF]

open access: yes, 2014
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core   +2 more sources

Algorithm Selection Framework for Cyber Attack Detection

open access: yes, 2020
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman   +15 more
core   +1 more source

Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy

open access: yesEpilepsia, EarlyView.
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie   +10 more
wiley   +1 more source

Cyber security as a central strategy for smart community [PDF]

open access: yes, 2013
The cyber threat landscape has evolved in fairly dramatic ways.Cyber threats come in various different forms both technical and content related threats.Emerging threats have become sophisticated and a lot more disastrous involving state actors, state ...
Abdul Wahab, Amirudin
core  

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]

open access: yes, 2011
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David   +2 more
core   +1 more source

Decentralized Federated Learning for Wind Turbine Bearing Prognostics Under Data Scarcity and Statistical Heterogeneity

open access: yesEnergy Science &Engineering, EarlyView.
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom   +2 more
wiley   +1 more source

Maritime Cyber Threats and Challenges

open access: yesNational Security and the Future, 2020
The maritime trade becomes crucial for countries' economy, security and sovereignty. Side by side to the growth of shipping, the vessels themselves and the sea-ports become more and more sophisticated, advanced and controlled by computerized and automated systems.
openaire   +2 more sources

Technological Evolution in Fintech: A Decadal Scientometric and Systematic Review of Developments and Criticisms

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Home - About - Disclaimer - Privacy