Results 161 to 170 of about 196,474 (374)
Reports produced by popular malware analysis services showed a disparity in samples available for different malware families. The unequal distribution between such classes can be attributed to several factors, such as technological advances and the ...
Antonio Coscia+3 more
doaj +1 more source
Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity [PDF]
Jeff Hughes, George Cybenko
openalex +1 more source
An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4
Unmanned Aerial Vehicles (UAVs) are aerial vehicles that can go to a particular position without human control or with remote human control. It is because unmanned control mainly relies on position estimation that a lot of research has been studied on ...
Ji Hyuk Jung+3 more
doaj +1 more source
Cybersecurity, massive data processing, community interaction, and other developments at WWW-based computational X-ray Server [PDF]
S. A. Stepanov
openalex +1 more source
ABSTRACT Policy analysts and academics play a critical role in informing policy design, implementation and evaluation. They apply their understanding of current social and economic issues, test theoretical frameworks and present new ideas that are a part of the ecosystem for promoting and sustaining efficient and equitable delivery of government ...
Chaminda Rajeev Samarage+1 more
wiley +1 more source
Two-Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things
Industrial control systems (ICSs) increasingly leverage the industrial internet of things (IIoTs) for sensor-based automation, enhancing operational efficiency.
Jian Shu, Jiazhong Lu
doaj +1 more source
Secure and Efficient maTLS With Proxy Signature Scheme
Many companies providing mobile and web-based internet services deploy various middleboxes, including network and security appliances, to enhance network functionality and security. In particular, security appliances such as Web Application Firewalls and
Taehyun Ahn, Jiwon Kwak, Seungjoo Kim
doaj +1 more source
Addressing Algorithmic Bias in AI‐Driven HRM Systems: Implications for Strategic HRM Effectiveness
ABSTRACT AI and machine learning algorithms are revolutionising the modern workplace by transforming HR functions to deliver superior outcomes for both employees and organisations. However, research shows that these algorithms often fail to deliver optimal HR solutions, primarily due to inherent biases.
Ruwan J. Bandara+4 more
wiley +1 more source
Editorial: Cybersecurity (July 2013) [PDF]
Chris McPhee, Tony Bailetti
openalex +1 more source
The Development of Japan's Indo‐Pacific Strategy: Security Concerns and Instrumental Principles
ABSTRACT The Free and Open Indo‐Pacific (FOIP) has served as Japan's central diplomatic vision since its launch in 2016. This paper examines how and why Japan's FOIP has evolved in response to changing strategic environments since its inception. This paper addresses this question by examining the three versions of FOIP and analyzing the evolving ...
Hidetaka Yoshimatsu
wiley +1 more source