Results 51 to 60 of about 4,651 (188)

A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems

open access: yesIEEE Access
In this current era, cyber-physical systems (CPSs) have gained concentrated consideration in various fields because of their emergent applications. Though the robust dependence on communication networks creates cyber-physical systems susceptible to ...
Shivani Gaba   +8 more
doaj   +1 more source

Security of the European Union from the Point of View of Cyber Security Issues [PDF]

open access: yesKošická bezpečnostná revue, 2019
The number of cyberattacks against public and private companies, as well as the extent of the damage caused by this type of crime, is increasing in recent years.
Radoslav IVANČÍK
doaj  

Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects

open access: yesHigh Voltage, EarlyView.
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi   +3 more
wiley   +1 more source

Tech Diplomacy and the Digital International Order: The Case of the EU–U.S. Trade and Technology Council

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines the evolving role of the U.S.–EU Trade and Technology Council (TTC) in advancing the EU's digital diplomacy, with a particular focus on its contribution to global digital ordering. Positioned at the intersection of normative engagement and regulatory coordination, the TTC operates as a hybrid mechanism that integrates ...
Corneliu Bjola, Raluca Csernatoni
wiley   +1 more source

Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley   +1 more source

Private Network Realignment: State Strategies Versus Market‐Driven Globalization in the Subsea Cable Network

open access: yesGlobal Policy, EarlyView.
ABSTRACT Much of the subsea cable network, which carries the vast majority of global internet traffic, is developed, owned, and operated by private corporations. In an era of growing global tensions, states have come to view these cables as critical to their interests. The article addresses the disconnect between statecraft‐centric explanations and the
Joscha Abels
wiley   +1 more source

Downside risk similarity and M&As

open access: yesContemporary Accounting Research, EarlyView.
Abstract Downside risks are ubiquitous and can profoundly impact firm operations and valuation. Failure to adequately assess and manage target firms' downside risks hinders acquirers' ability to integrate and manage these businesses. This article introduces a novel measure of firms' downside risk similarity (DRS) based on risk factor descriptions and ...
Lei Chen   +3 more
wiley   +1 more source

From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan   +3 more
wiley   +1 more source

Two-Layer Deception Model Based on Signaling Games Against Cyber Attacks on Cyber-Physical Systems

open access: yesIEEE Access
Cyber-physical systems (CPS) are increasingly vulnerable to sophisticated cyber-attacks that can target multiple layers within the system. To strengthen defenses against these complex threats, deception-based techniques have emerged as a promising ...
Priva Chassem Kamdem   +4 more
doaj   +1 more source

Ciberespacio y el Crimen Organizado. Los nuevos desafíos del siglo XXI [PDF]

open access: yesRevista Enfoques, 2012
The Occidental Societies are becoming more vulnerable by the possible cybernetic attacks because of their large dependency on Computer and Electronics Systems and fraud in the network. Moreover, Internet is an easily accessible, where any person, keeping
Gema Sánchez Medero
doaj  

Home - About - Disclaimer - Privacy