Results 131 to 140 of about 164,979 (324)
Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity [PDF]
Jeff Hughes, George Cybenko
openalex +1 more source
ABSTRACT This study explores the development of sustainable rural tourism through a multidisciplinary approach, integrating economic, technological, and environmental perspectives. It aims to analyze research trends, key contributors, and the role of artificial intelligence (AI) in shaping the future of rural tourism.
Ana M. Sánchez‐Sánchez +2 more
wiley +1 more source
Cybersecurity, massive data processing, community interaction, and other developments at WWW-based computational X-ray Server [PDF]
S. A. Stepanov
openalex +1 more source
A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas +6 more
wiley +1 more source
Maximizing the Economic, Environmental, and Social Impact of the Metaverse
ABSTRACT The metaverse is a transformative digital ecosystem with the potential to redefine economic, environmental, and social systems. This qualitative study examines how the metaverse and its enabling technologies—such as AR/VR, blockchain, and AI—might evolve to influence sustainability. Drawing on semi‐structured interviews with global experts and
Alessandro Lanteri +2 more
wiley +1 more source
Editorial: Cybersecurity (July 2013) [PDF]
Chris McPhee, Tony Bailetti
openalex +1 more source
Editorial: Cybersecurity (October 2014) [PDF]
Chris McPhee, Tony Bailetti
openalex +2 more sources
The NCP cybersecurity challenges
The Next Computing Paradigm (NCP), with its numerous, interconnected and communicating elements, from servers and services to IoT, sensors and user interfaces, offers an immensely vast cyberattack surface. This must be addressed for the NCP to succeed.
Zendra, Olivier, Coppens, Bart
openaire +2 more sources
Navigating secure storage requirements for EUDI Wallets: a review paper
The European Digital Identity Wallet (EUDI Wallet) plays a pivotal role in shaping digital identity across the EU, necessitating a secure storage solution compliant with eIDAS2 regulation.
Zahra Ebadi Ansaroudi +3 more
doaj +1 more source
Healthcare Cybersecurity Risk Management: Keys To an Effective Plan [PDF]
Anthony J. Coronado +1 more
openalex +1 more source

