Results 81 to 90 of about 142,803 (291)

Smart Grid Security: Threats, Challenges, and Solutions [PDF]

open access: yes, 2016
The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points.
Biswas, Saroj   +4 more
core   +2 more sources

Land Use Transformation and Climate Resilience in Smart Cities: Role of ICT in Modern Urban Planning

open access: yesLand Degradation &Development, EarlyView.
ABSTRACT Modern urban planning is experiencing a transition from traditional planning to the integration of information technology, which defines the concept of a “smart city”. The study analyses the evolution of urban planning practices with an emphasis on the role of engineering and architecture in the process of urbanization, the transition to the ...
Dariusz Cichoń
wiley   +1 more source

Cyber Threat in Interstate Relations: Case of US-Russia Cyber Tensions

open access: yesPolicy Perspectives, 2018
The 20 th century was overshadowed by conventional military threats, whereas the 21 st century has witnessed the preeminence of non-conventional security threats, including terrorism, transnational crime, civil wars, environmental degeneration and ...
Dr. Muhammad Riaz Shad
doaj   +1 more source

Life after herbarium digitisation: Physical and digital collections, curation and use

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton   +39 more
wiley   +1 more source

Risk Modelling of Cyber Threats Against MIS and ERP Applications

open access: yesPamukkale Üniversitesi İşletme Araştırmaları Dergisi
This study presents a detailed examination of cyber threats impacting Management Information Systems (MIS) and Enterprise Resource Planning (ERP) applications.
Ahmet Efe
doaj   +1 more source

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

A FRAMEWORK FOR CYBERSECURITY STRATEGY FOR DEVELOPING COUNTRIES: CASE STUDY OF AFGHANISTAN

open access: yesAsia-Pacific Journal of Information Technology and Multimedia, 2015
Given the importance of cyber space for country development, different countries have conducted a lot of investment in cyber space application. Since, based on official documents, Afghanistan is in the process of integrating ICT into its critical ...
Khosraw Salamzada   +2 more
doaj   +1 more source

RWU Cybersecurity Expert Works on State Initiative to Combat Cyber Threats [PDF]

open access: yes, 2017
As a founding member of the state\u27s Joint Cyber Task Force, RWU Cybersecurity Program Director Douglas White battles cyber disruptions in R.I.
Siliezar, Juan
core   +1 more source

Industry 5.0 for Sustainable Healthcare Services: Analyzing the Prospects and Obstacles for the Indian Healthcare System

open access: yesSustainable Development, EarlyView.
ABSTRACT The fifth industrial revolution (I5.0), which is based on the utilization of interconnected data for efficient resource usage in meeting human requirements, proposes efficient solutions to resource constraint situations. However, the transition to I5.0 in the health sector is not easy and has to face several obstacles.
Ajay Jha   +5 more
wiley   +1 more source

THE EVOLUTION OF NATO’S CYBER SECURITY POLICY AND FUTURE PROSPECTS [PDF]

open access: yesJournal of Defense Resources Management, 2019
While the future landscape of cyberspace is becoming quite complicated, NATO must define the potential threats and adapt its strategy to these challenges.
Arif Hasan HASANOV   +2 more
doaj  

Home - About - Disclaimer - Privacy