Results 131 to 140 of about 164,979 (324)

Trends and Challenges of Sustainable Rural Tourism in the Face of Artificial Intelligence: A Bibliometric Analysis

open access: yesSustainable Development, EarlyView.
ABSTRACT This study explores the development of sustainable rural tourism through a multidisciplinary approach, integrating economic, technological, and environmental perspectives. It aims to analyze research trends, key contributors, and the role of artificial intelligence (AI) in shaping the future of rural tourism.
Ana M. Sánchez‐Sánchez   +2 more
wiley   +1 more source

A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas   +6 more
wiley   +1 more source

Maximizing the Economic, Environmental, and Social Impact of the Metaverse

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT The metaverse is a transformative digital ecosystem with the potential to redefine economic, environmental, and social systems. This qualitative study examines how the metaverse and its enabling technologies—such as AR/VR, blockchain, and AI—might evolve to influence sustainability. Drawing on semi‐structured interviews with global experts and
Alessandro Lanteri   +2 more
wiley   +1 more source

Editorial: Cybersecurity (July 2013) [PDF]

open access: diamond, 2013
Chris McPhee, Tony Bailetti
openalex   +1 more source

The NCP cybersecurity challenges

open access: yes
The Next Computing Paradigm (NCP), with its numerous, interconnected and communicating elements, from servers and services to IoT, sensors and user interfaces, offers an immensely vast cyberattack surface. This must be addressed for the NCP to succeed.
Zendra, Olivier, Coppens, Bart
openaire   +2 more sources

Navigating secure storage requirements for EUDI Wallets: a review paper

open access: yesEURASIP Journal on Information Security
The European Digital Identity Wallet (EUDI Wallet) plays a pivotal role in shaping digital identity across the EU, necessitating a secure storage solution compliant with eIDAS2 regulation.
Zahra Ebadi Ansaroudi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy