Results 1 to 10 of about 14,042 (178)
Analyzing the effect of physical activity on cyberattack behavior in college students using the chain mediation model [PDF]
IntroductionCyberattack behavior is an undesirable phenomenon among college students in China that cannot be ignored, and it has always been under the close scrutiny of researchers.
Hongbo Zhao, Bo Chen
doaj +2 more sources
Optimized ensemble machine learning model for cyberattack classification in industrial IoT [PDF]
IntroductionThe increasing cyber threats targeting industrial control systems (ICS) and the Internet of Things (IoT) pose significant risks, especially in critical infrastructures like the oil and gas sector. Existing machine learning (ML) approaches for
Batool Alabdullah +1 more
doaj +2 more sources
Decentralized Cyberattack Attribution [PDF]
Attribution of state-sponsored cyberattacks can be difficult, but the significant uptick in attributions in recent years shows that attribution is far from impossible.
Kristen E. Eichensehr
doaj +2 more sources
Cyberattack on the NHLS Network: Highlighting the crucial role of laboratory medicine [PDF]
The ransomware cyberattack on the National Health Laboratory Service (NHLS) network highlighted the indispensable role of laboratory medicine in the healthcare system.
Tahir S. Pillay
doaj +2 more sources
The growing importance of digital risk&governance [PDF]
The aim of the paper is to explain what is meant by Digital Risk&Governance. For this purpose, it is important to retrace the technological evolution that has affected the last few decades: from branches to Mobile Banking, from the digitalization of ...
Valerio Begozzi +2 more
doaj +1 more source
Asymptotic Performance Limitations in Cyberattack Detection
In this paper, we consider the difficulty of cyberattack detection with $d$ sensors and $n$ observations, and derive performance bounds that are valid independent of the attack detection algorithm used.
Onur Toker
doaj +1 more source
Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework
Cybersecurity is important on ships that use information and communication technology. On such ships, the work, control, and sensor systems are connected for steering, navigation, and cargo management inside the hull, and a cyberattack can have physical ...
Yonghyun Jo +4 more
doaj +1 more source
In the context of “generation-network-load-storage” coordination, energy system development presents the characteristics of frequent multi-party data interaction and multi-source data fusion.
XU Xunwei +4 more
doaj +1 more source
In order to ensure the safety of connected and automated vehicles (CAVs) threatened by cyberattack in the confluence area and mitigate the adverse impact of cyberattack propagation, a framework is built to depict the impact of cyberattacks on traffic ...
Qiuling Wang +3 more
doaj +1 more source
Protection of accounting information in the conditions of cyber security
In the given study, it is substantiated that the unauthorized use of information generated in the accounting system can lead to harmful consequences, risking loss of information, incorrect data entry and misuse of confidential information. Therefore, the
S.F. , І.M. , O.O.
doaj +1 more source

