Results 1 to 10 of about 181,953 (301)
At present, sensors are increasingly used in all kinds of platforms, manned or unmanned, particularly in view of the emerging Internet of Things (IoT) [...]
Dimitris A. Gritzalis +2 more
openaire +3 more sources
AbstractCybersecurity policies aim to ensure that digital technologies are safe and resilient. It is impossible to guarantee that technology is fully cyber-incident proof. However, it is possible and desirable to increase technologies’ resilience to incidents and malicious attacks to minimize the risk of using technology. For this reason, cybersecurity
Liebetrau, Tobias, Monsees, Linda
+8 more sources
New technologies such as Internet of Things, blockchain and artificial intelligence have boosted the digital transformation of organisations and enabled a radical change in the provision of services deeply changing the related business models. At the same time digital technologies generate massive amounts of data and, as business and IT experts know ...
Francesco Bellini, Fabrizio D'Ascenzo
+11 more sources
Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022
High-quality academic publishing is built on rigorous peer review [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj +1 more source
Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj +1 more source
Car manufacturers are noticing and encouraging a trend away from individual mobility, where a vehicle is owned and driven by one or only a few other persons, and towards shared-mobility concepts.
Valaenthin Tratter +2 more
doaj +1 more source
System API Vectorization for Malware Detection
Data is essential to the performance of artificial intelligence (AI) based malware detection models. System APIs, which allocate operating system resources, are important for identifying malicious behaviors.
Kyounga Shin +4 more
doaj +1 more source
A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks
In complex networks, identifying influential nodes is of great importance for its wide applications. Traditional centrality methods are usually directly based on topological structures of networks, and different centrality methods consider different ...
Gouheng Zhao +4 more
doaj +1 more source
Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API
With the rapid advances of anti-virus and anti-tracking technologies, three aspects in malware clustering need to be improved for effective clustering, i.e., the robustness of features, the accuracy of similarity measurements, and the effectiveness of ...
Yong Fang +4 more
doaj +1 more source
Abstract Deepthi Ratnayake MBCS, Senior Lecturer in Computer Science, explains the Colonial Pipeline attack that revolutionised ransomware landscape.
openaire +1 more source

