Results 71 to 80 of about 140,490 (288)

Optimization of cyber security through the implementation of AI technologies

open access: yesJournal of Intelligent Systems
Identification of cyber threats is crucial and significant for determining substantial security techniques and approaches. This research illustrates a brief discussion of cyberspace challenges and threats in a disruptive era alongside comprehensive ...
Nawaf Liqaa, Bentotahewa Vibhushinie
doaj   +1 more source

Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]

open access: yes, 2016
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core  

Life after herbarium digitisation: Physical and digital collections, curation and use

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton   +39 more
wiley   +1 more source

Research on Improving Cyber Resilience by Integrating the Zero Trust Security Model With the MITRE ATT&CK Matrix

open access: yesIEEE Access
With the advent of the digital information age, the dynamics of cyberspace are rapidly evolving, resulting in a significant increase in cyber threats. In this paper, we propose to integrate the Zero Trust (ZT) security model and the MITRE ATT&CK ...
Gwanghyun Ahn   +3 more
doaj   +1 more source

Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]

open access: yes, 2015
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M   +12 more
core  

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Cyber–Physical Security Assessment for Maritime Vessels: Study on Drillship DP System Using American Petroleum Institute Security Risk Analysis and Bow-Tie Analysis

open access: yesJournal of Marine Science and Engineering
The maritime industry’s increasing integration of IT/OT systems into vessel operations has significantly elevated its exposure to cyber–physical threats, making the development of effective cyber risk management strategies a necessity.
Iosif Progoulakis   +5 more
doaj   +1 more source

Cyber Threat in Interstate Relations: Case of US-Russia Cyber Tensions

open access: yesPolicy Perspectives, 2018
The 20 th century was overshadowed by conventional military threats, whereas the 21 st century has witnessed the preeminence of non-conventional security threats, including terrorism, transnational crime, civil wars, environmental degeneration and ...
Dr. Muhammad Riaz Shad
doaj   +1 more source

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

Strategy of the higher educations of Ukraine in training of experts on informational and cyber security [PDF]

open access: yes, 2018
In October 2017 the European Council again called the attention and assigned the task to enhance the cyber security actions within EU countries. The provided regulations underline the necessity in joint actions to combat cybercrimes.
Borsukovska, Viktoriia   +2 more
core  

Home - About - Disclaimer - Privacy