Results 41 to 50 of about 14,082 (218)
Redundancy–Based Intrusion Tolerance Approaches Moving from Classical Fault Tolerance Methods
Borrowing from well known fault tolerant approaches based on redundancy to mask the effect of faults, redundancy-based intrusion tolerance schemes are proposed in this paper, where redundancy of ICT components is exploited as a first defense line against
Di Giandomenico Felicita +2 more
doaj +1 more source
Nudging Online Security Behaviour with Warning Messages: Results from an online experiment [PDF]
This study is part of a larger effort to better understand online behaviour. We tested the effect on people’s security behaviour of different ways of warning them about cybersecurity threats with an online experiment (n=5,065) in Germany, Sweden, Poland,
RODRIGUEZ PRIEGO NURIA, VAN BAVEL Rene
core +1 more source
ABSTRACT This study examines the economic consequences of Digital Technologies Disclosure (DTD), focusing on its impact on the cost of capital. The increasing significance of digital transformation in shaping corporate strategies and market perceptions motivates the study.
Hussein Mohsen Saber Ahmed +2 more
wiley +1 more source
CHALLENGES OF GRANTING THE STATUS OF CASUS BELLI TO A CYBERATTACK ON A NATO MEMBER STATE
The article analyzes the problems associated with recognizing a cyberattack on a NATO member state as a reason to declare war (casus belli). The article reveals the evolution of the Alliance's approaches to the issues of cyber threats and cyber defense ...
KHODANOV Andrei Ivanovich
doaj +1 more source
This paper aims to study the workflow of the detection centre of stealthy attacks on industrial installations that generate an increase in energy consumption.
Jakub Filip Możaryn +6 more
doaj +1 more source
Meeting the Challenge of Cyberterrorism: Defining the Military Role in a Democracy [PDF]
Denna forskningskonsumtion strävar efter att utifrån två frågeställningar undersöka dels var det deliberativa samtalets möjligheter och begränsningar ligger, dels undersöka hur det deliberativa samtalet påverkar lärarrollen i klassrummet.
Dunlap, Charles J., Jr.
core +1 more source
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi +4 more
wiley +1 more source
Cybersecurity in Cyber–Physical Power Systems
The current energy transition combined with the modernization of power systems has provided meaningful transformations in the transmission, distribution, operation, planning, monitoring, and control of power systems.
Luiz Fernando Ribas Monteiro +2 more
doaj +1 more source
Cyber-Deception and Attribution in Capture-the-Flag Exercises
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish +4 more
core +1 more source
Machine Learning–Enhanced Fluorescence Cryptography with NADH‐Responsive Polymer Dots
This study presents a smart anticounterfeiting system using semiconducting polymer dots (Pdots) that exhibit tunable fluorescence responses to NADH. By integrating these dynamic optical signals with machine learning–based decoding, the work establishes a secure and intelligent encryption platform, showing a novel strategy that links chemical sensing ...
Zhengkun Zhan +7 more
wiley +1 more source

