Results 11 to 20 of about 164,979 (324)
At present, sensors are increasingly used in all kinds of platforms, manned or unmanned, particularly in view of the emerging Internet of Things (IoT) [...]
Dimitris A. Gritzalis +2 more
openaire +3 more sources
Cybersecurity in Russia is not a standalone concept but an integral part of national information security, which influences its legal status and applicable regulation, and determines its development trends. The purpose of this article is to outline the Russian approach to cybersecurity, describe the related legal framework, representative business ...
Olga Chislova, Marina Sokolova
openaire +3 more sources
Cite as Michael Veale and Ian Brown (2020) 'Cybersecurity' 9(4) Internet Policy Review Cybersecurity covers the broad range of technical and social issues that must be considered to protect networked information systems. The importance of the concept has increased as so many government, business, and day-to-day activities globally have moved online. It
Veale, Michael, Brown, Ian
openaire +6 more sources
Abstract Dr Deepthi Ratnayake explains what the latest attacks tell us about ransomware’s ...
Liebetrau, Tobias, Monsees, Linda
openaire +3 more sources
AbstractBased on textual analysis and a comparison of cybersecurity risk disclosures of firms that were hacked to others that were not, we propose a novel firm-level measure of cybersecurity risk for all U.S.-listed firms. We then examine whether cybersecurity risk is priced in the cross-section of stock returns.
Florackis, Chris +3 more
openaire +3 more sources
Cybersecurity awareness can be viewed as the level of appreciation, understanding or knowledge of cybersecurity or information security aspects. Such aspects include cognizance of cyber risks and threats, but also appropriate protection measures.
openaire +3 more sources
Artificial intelligence in the cyber domain: Offense and defense [PDF]
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao +2 more
core +1 more source
Android Malware Familial Classification Based on DEX File Section Features
The rapid proliferation of Android malware is challenging the classification of the Android malware family. The traditional static method for classification is easily affected by the confusion and reinforcement, while the dynamic method is expensive in ...
Yong Fang +3 more
doaj +1 more source
A Novel Hybrid Model for Cantonese Rumor Detection on Twitter
The development of information technology and mobile Internet has spawned the prosperity of online social networks. As the world’s largest microblogging platform, Twitter is popular among people all over the world.
Xinyu Chen +4 more
doaj +1 more source
Emergent Behavior in Cybersecurity [PDF]
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core +1 more source

