Results 21 to 30 of about 4,651 (188)

Increase vigilance against cyberattacks

open access: yesNature Biotechnology, 2022
The biotech sector must devote more resources to cybersecurity — especially those companies that are manufacturers of essential medical products.
openaire   +2 more sources

Exploring the gamification of cybersecurity education in higher education institutions: An analytical study [PDF]

open access: yesSHS Web of Conferences, 2023
Our world has become increasingly dependent on electronic technology. As most economic, cultural, and social activities are conducted in cyberspace, how to protect data from cyberattacks has arisen as a prominent challenge.
Xiao Hanyu   +5 more
doaj   +1 more source

A Model to Measure Effectiveness in Cyber Security Situational Awareness [PDF]

open access: yesComputer and Knowledge Engineering
Nowadays, the number of cyberattacks and, consequently, the risk of them is increasing significantly. So, it is vital to be aware of the cybersecurity situation.
Motahareh Dehghan   +2 more
doaj   +1 more source

On the Road to Holistic Decision Making in Adaptive Security [PDF]

open access: yesTechnology Innovation Management Review, 2013
Security is a critical concern in today's software systems. Besides the interconnectivity and dynamic nature of network systems, the increasing complexity in modern software systems amplifies the complexity of IT security.
Mahsa Emami-Taba   +2 more
doaj  

The Impact of Cybersecurity Breaches on Firm’s Market Value: the Case of the USA

open access: yesЭкономика: стратегия и практика
In the context of global digitalization trends, the problem of the impact of cyberattacks on the company is significantly relevant. This article is devoted to the impact of cyberattacks on the firms’ market value since it is an indicator of firm ...
G. K. Issayeva   +4 more
doaj   +1 more source

Cyberattack detection model using community detection and text analysis on social media

open access: yesICT Express, 2022
Online social media such as Twitter has been used as an important source for predicting, detecting, or analyzing critical social phenomena such as elections, disease outbreaks, and cyberattacks.
Jeong-Ha Park, Hyuk-Yoon Kwon
doaj   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing

open access: yesAdvanced Intelligent Systems, EarlyView.
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian   +37 more
wiley   +1 more source

Comprehensive Cyberattack Chain

open access: yesSSRN Electronic Journal, 2023
“Where you stand depends on where you sit”, is also applicable to the appreciation of models which analyse cyberattacks. The most widely known models (e.g. Lockheed Martin’s Cyber Kill Chain) are of a technological nature. They focus on cybersecurity and are mainly reactive, whilst certain aspects, such as the dissemination of (false) information ...
Arnold, K.L.   +2 more
openaire   +3 more sources

Dual Entropy Source Physical Unclonable Functions of Reconfigurable Feedback Field‐Effect Transistors with Polycrystalline Silicon Channels

open access: yesAdvanced Intelligent Systems, EarlyView.
Physically unclonable functions (PUFs) of reconfigurable feedback field‐effect transistors (R‐FBFETs) with polycrystalline silicon channels are designed for dual entropy sources. The uniqueness and reliability of the dual entropy source PUF are verified by inter‐ and intra‐Hamming distances of 49.13% and 3.47%, respectively, as well as NIST statistical
Taeho Park   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy