Results 81 to 90 of about 140,490 (288)

A Method for Assessing the Risks to Sustainability Posed by Process Operations

open access: yesSustainable Development, EarlyView.
ABSTRACT We present a framework for assessing the risks to sustainability posed by any given set of processes. The objective is to improve sustainability by enabling better decision‐making in policy and business contexts. The framework can be applied to any system of processes where available information supports discovery and quantification of ...
Richard C. Darton, Colin J. Axon
wiley   +1 more source

A FRAMEWORK FOR CYBERSECURITY STRATEGY FOR DEVELOPING COUNTRIES: CASE STUDY OF AFGHANISTAN

open access: yesAsia-Pacific Journal of Information Technology and Multimedia, 2015
Given the importance of cyber space for country development, different countries have conducted a lot of investment in cyber space application. Since, based on official documents, Afghanistan is in the process of integrating ICT into its critical ...
Khosraw Salamzada   +2 more
doaj   +1 more source

Developing a Framework for the Quality‐Driven Migration to Microservices: A Multi‐Method Design Science Study

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Context The microservices architectural style has revolutionized the way modern software systems are developed and operated. While the development of new microservices systems can leverage a wide range of resources and proven strategies, the migration of an existing monolithic system is not easily generalizable.
Jonas Fritzsch   +6 more
wiley   +1 more source

THE EVOLUTION OF NATO’S CYBER SECURITY POLICY AND FUTURE PROSPECTS [PDF]

open access: yesJournal of Defense Resources Management, 2019
While the future landscape of cyberspace is becoming quite complicated, NATO must define the potential threats and adapt its strategy to these challenges.
Arif Hasan HASANOV   +2 more
doaj  

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

The Australian Cyber Security Centre threat report 2015 [PDF]

open access: yes
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for
Australian Cyber Security Centre
core  

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Assessing Capability Complexity Using Enterprise Architecture Framework

open access: yesSystems Engineering, EarlyView.
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley   +1 more source

How Cyber-Resilient Are Unmanned Aircraft Systems? A Systematic Meta-Review

open access: yesAerospace
Unmanned Aircraft Systems (UASs) offer a promising future for aviation operations, even though it suffers larger cyber-related challenges. As such, cyber-resilience becomes a core property for drones’ operations.
Andrea Montaruli   +2 more
doaj   +1 more source

Automating Attack and Defense Strategies in Cybersecurity [PDF]

open access: yesInformatică economică
Given the ongoing development and variety of cyber threats, there is a growing urgency for a proactive and efficient approach to IT security. This article presents a novel approach to automating cyber security attack and defense techniques by using ...
Ionut LATES, Catalin BOJA
doaj   +1 more source

Home - About - Disclaimer - Privacy