Results 1 to 10 of about 181,953 (301)

Sensors Cybersecurity [PDF]

open access: yesSensors, 2021
At present, sensors are increasingly used in all kinds of platforms, manned or unmanned, particularly in view of the emerging Internet of Things (IoT) [...]
Dimitris A. Gritzalis   +2 more
openaire   +3 more sources

Cybersecurity

open access: yesITNOW, 2022
AbstractCybersecurity policies aim to ensure that digital technologies are safe and resilient. It is impossible to guarantee that technology is fully cyber-incident proof. However, it is possible and desirable to increase technologies’ resilience to incidents and malicious attacks to minimize the risk of using technology. For this reason, cybersecurity
Liebetrau, Tobias, Monsees, Linda
  +8 more sources

Cybersecurity [PDF]

open access: yesInternet Policy Review, 2020
New technologies such as Internet of Things, blockchain and artificial intelligence have boosted the digital transformation of organisations and enabled a radical change in the provision of services deeply changing the related business models. At the same time digital technologies generate massive amounts of data and, as business and IT experts know ...
Francesco Bellini, Fabrizio D'Ascenzo
  +11 more sources

Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022

open access: yesJournal of Cybersecurity and Privacy, 2023
High-quality academic publishing is built on rigorous peer review [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj   +1 more source

Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021

open access: yesJournal of Cybersecurity and Privacy, 2022
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj   +1 more source

Shared Mobility for Transport and Its Environmental Impact VeSIPreS: A Vehicular Soft Integrity Preservation Scheme for Shared Mobility

open access: yesJournal of Advanced Transportation, 2021
Car manufacturers are noticing and encouraging a trend away from individual mobility, where a vehicle is owned and driven by one or only a few other persons, and towards shared-mobility concepts.
Valaenthin Tratter   +2 more
doaj   +1 more source

System API Vectorization for Malware Detection

open access: yesIEEE Access, 2023
Data is essential to the performance of artificial intelligence (AI) based malware detection models. System APIs, which allocate operating system resources, are important for identifying malicious behaviors.
Kyounga Shin   +4 more
doaj   +1 more source

A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks

open access: yesIEEE Access, 2020
In complex networks, identifying influential nodes is of great importance for its wide applications. Traditional centrality methods are usually directly based on topological structures of networks, and different centrality methods consider different ...
Gouheng Zhao   +4 more
doaj   +1 more source

Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API

open access: yesIEEE Access, 2020
With the rapid advances of anti-virus and anti-tracking technologies, three aspects in malware clustering need to be improved for effective clustering, i.e., the robustness of features, the accuracy of similarity measurements, and the effectiveness of ...
Yong Fang   +4 more
doaj   +1 more source

Insight: Cybersecurity

open access: yesITNOW, 2021
Abstract Deepthi Ratnayake MBCS, Senior Lecturer in Computer Science, explains the Colonial Pipeline attack that revolutionised ransomware landscape.
openaire   +1 more source

Home - About - Disclaimer - Privacy