Results 1 to 10 of about 14,042 (178)

Analyzing the effect of physical activity on cyberattack behavior in college students using the chain mediation model [PDF]

open access: yesFrontiers in Psychology
IntroductionCyberattack behavior is an undesirable phenomenon among college students in China that cannot be ignored, and it has always been under the close scrutiny of researchers.
Hongbo Zhao, Bo Chen
doaj   +2 more sources

Optimized ensemble machine learning model for cyberattack classification in industrial IoT [PDF]

open access: yesFrontiers in Artificial Intelligence
IntroductionThe increasing cyber threats targeting industrial control systems (ICS) and the Internet of Things (IoT) pose significant risks, especially in critical infrastructures like the oil and gas sector. Existing machine learning (ML) approaches for
Batool Alabdullah   +1 more
doaj   +2 more sources

Decentralized Cyberattack Attribution [PDF]

open access: yesAJIL Unbound, 2019
Attribution of state-sponsored cyberattacks can be difficult, but the significant uptick in attributions in recent years shows that attribution is far from impossible.
Kristen E. Eichensehr
doaj   +2 more sources

Cyberattack on the NHLS Network: Highlighting the crucial role of laboratory medicine [PDF]

open access: yesJournal of the Colleges of Medicine of South Africa
The ransomware cyberattack on the National Health Laboratory Service (NHLS) network highlighted the indispensable role of laboratory medicine in the healthcare system.
Tahir S. Pillay
doaj   +2 more sources

The growing importance of digital risk&governance [PDF]

open access: yesRisk Management Magazine, 2023
The aim of the paper is to explain what is meant by Digital Risk&Governance. For this purpose, it is important to retrace the technological evolution that has affected the last few decades: from branches to Mobile Banking, from the digitalization of ...
Valerio Begozzi   +2 more
doaj   +1 more source

Asymptotic Performance Limitations in Cyberattack Detection

open access: yesIEEE Open Journal of Circuits and Systems, 2023
In this paper, we consider the difficulty of cyberattack detection with $d$ sensors and $n$ observations, and derive performance bounds that are valid independent of the attack detection algorithm used.
Onur Toker
doaj   +1 more source

Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework

open access: yesSensors, 2022
Cybersecurity is important on ships that use information and communication technology. On such ships, the work, control, and sensor systems are connected for steering, navigation, and cargo management inside the hull, and a cyberattack can have physical ...
Yonghyun Jo   +4 more
doaj   +1 more source

A data-driven correlation analysis of cyberattack on coordinated source-network-load-storage control system

open access: yesZhejiang dianli, 2023
In the context of “generation-network-load-storage” coordination, energy system development presents the characteristics of frequent multi-party data interaction and multi-source data fusion.
XU Xunwei   +4 more
doaj   +1 more source

Suppression strategies in different propagation periods of cyberattacks in merging area under connected environment

open access: yesJournal of Traffic and Transportation Engineering (English ed. Online), 2023
In order to ensure the safety of connected and automated vehicles (CAVs) threatened by cyberattack in the confluence area and mitigate the adverse impact of cyberattack propagation, a framework is built to depict the impact of cyberattacks on traffic ...
Qiuling Wang   +3 more
doaj   +1 more source

Protection of accounting information in the conditions of cyber security

open access: yesПроблеми теорії та методології бухгалтерського обліку, контролю і аналізу, 2022
In the given study, it is substantiated that the unauthorized use of information generated in the accounting system can lead to harmful consequences, risking loss of information, incorrect data entry and misuse of confidential information. Therefore, the
S.F. , І.M. , O.O.
doaj   +1 more source

Home - About - Disclaimer - Privacy