Results 41 to 50 of about 14,082 (218)

Redundancy–Based Intrusion Tolerance Approaches Moving from Classical Fault Tolerance Methods

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2022
Borrowing from well known fault tolerant approaches based on redundancy to mask the effect of faults, redundancy-based intrusion tolerance schemes are proposed in this paper, where redundancy of ICT components is exploited as a first defense line against
Di Giandomenico Felicita   +2 more
doaj   +1 more source

Nudging Online Security Behaviour with Warning Messages: Results from an online experiment [PDF]

open access: yes, 2016
This study is part of a larger effort to better understand online behaviour. We tested the effect on people’s security behaviour of different ways of warning them about cybersecurity threats with an online experiment (n=5,065) in Germany, Sweden, Poland,
RODRIGUEZ PRIEGO NURIA, VAN BAVEL Rene
core   +1 more source

Digital Technologies Disclosure and the Cost of Capital: The Mediating Role of Sustainability Performance

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study examines the economic consequences of Digital Technologies Disclosure (DTD), focusing on its impact on the cost of capital. The increasing significance of digital transformation in shaping corporate strategies and market perceptions motivates the study.
Hussein Mohsen Saber Ahmed   +2 more
wiley   +1 more source

CHALLENGES OF GRANTING THE STATUS OF CASUS BELLI TO A CYBERATTACK ON A NATO MEMBER STATE

open access: yesПравовое государство: теория и практика
The article analyzes the problems associated with recognizing a cyberattack on a NATO member state as a reason to declare war (casus belli). The article reveals the evolution of the Alliance's approaches to the issues of cyber threats and cyber defense ...
KHODANOV Andrei Ivanovich
doaj   +1 more source

Stealthy Cyberattacks Detection Based on Control Performance Assessment Methods for the Air Conditioning Industrial Installation

open access: yesEnergies, 2023
This paper aims to study the workflow of the detection centre of stealthy attacks on industrial installations that generate an increase in energy consumption.
Jakub Filip Możaryn   +6 more
doaj   +1 more source

Meeting the Challenge of Cyberterrorism: Defining the Military Role in a Democracy [PDF]

open access: yes, 2002
Denna forskningskonsumtion strävar efter att utifrån två frågeställningar undersöka dels var det deliberativa samtalets möjligheter och begränsningar ligger, dels undersöka hur det deliberativa samtalet påverkar lärarrollen i klassrummet.
Dunlap, Charles J., Jr.
core   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Cybersecurity in Cyber–Physical Power Systems

open access: yesEnergies, 2023
The current energy transition combined with the modernization of power systems has provided meaningful transformations in the transmission, distribution, operation, planning, monitoring, and control of power systems.
Luiz Fernando Ribas Monteiro   +2 more
doaj   +1 more source

Cyber-Deception and Attribution in Capture-the-Flag Exercises

open access: yes, 2015
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish   +4 more
core   +1 more source

Machine Learning–Enhanced Fluorescence Cryptography with NADH‐Responsive Polymer Dots

open access: yesENERGY &ENVIRONMENTAL MATERIALS, EarlyView.
This study presents a smart anticounterfeiting system using semiconducting polymer dots (Pdots) that exhibit tunable fluorescence responses to NADH. By integrating these dynamic optical signals with machine learning–based decoding, the work establishes a secure and intelligent encryption platform, showing a novel strategy that links chemical sensing ...
Zhengkun Zhan   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy