Results 21 to 30 of about 4,651 (188)
Increase vigilance against cyberattacks
The biotech sector must devote more resources to cybersecurity — especially those companies that are manufacturers of essential medical products.
openaire +2 more sources
Exploring the gamification of cybersecurity education in higher education institutions: An analytical study [PDF]
Our world has become increasingly dependent on electronic technology. As most economic, cultural, and social activities are conducted in cyberspace, how to protect data from cyberattacks has arisen as a prominent challenge.
Xiao Hanyu +5 more
doaj +1 more source
A Model to Measure Effectiveness in Cyber Security Situational Awareness [PDF]
Nowadays, the number of cyberattacks and, consequently, the risk of them is increasing significantly. So, it is vital to be aware of the cybersecurity situation.
Motahareh Dehghan +2 more
doaj +1 more source
On the Road to Holistic Decision Making in Adaptive Security [PDF]
Security is a critical concern in today's software systems. Besides the interconnectivity and dynamic nature of network systems, the increasing complexity in modern software systems amplifies the complexity of IT security.
Mahsa Emami-Taba +2 more
doaj
The Impact of Cybersecurity Breaches on Firm’s Market Value: the Case of the USA
In the context of global digitalization trends, the problem of the impact of cyberattacks on the company is significantly relevant. This article is devoted to the impact of cyberattacks on the firms’ market value since it is an indicator of firm ...
G. K. Issayeva +4 more
doaj +1 more source
Cyberattack detection model using community detection and text analysis on social media
Online social media such as Twitter has been used as an important source for predicting, detecting, or analyzing critical social phenomena such as elections, disease outbreaks, and cyberattacks.
Jeong-Ha Park, Hyuk-Yoon Kwon
doaj +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
Comprehensive Cyberattack Chain
“Where you stand depends on where you sit”, is also applicable to the appreciation of models which analyse cyberattacks. The most widely known models (e.g. Lockheed Martin’s Cyber Kill Chain) are of a technological nature. They focus on cybersecurity and are mainly reactive, whilst certain aspects, such as the dissemination of (false) information ...
Arnold, K.L. +2 more
openaire +3 more sources
Physically unclonable functions (PUFs) of reconfigurable feedback field‐effect transistors (R‐FBFETs) with polycrystalline silicon channels are designed for dual entropy sources. The uniqueness and reliability of the dual entropy source PUF are verified by inter‐ and intra‐Hamming distances of 49.13% and 3.47%, respectively, as well as NIST statistical
Taeho Park +4 more
wiley +1 more source

