Results 11 to 20 of about 196,474 (374)

From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy [PDF]

open access: yesIEEE Access, 2023
Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital transformation in the year 2022. As the different GenAI models like ChatGPT and Google Bard continue to foster their complexity and capability, it’s critical to ...
Maanak Gupta   +4 more
semanticscholar   +1 more source

Sensors Cybersecurity [PDF]

open access: yesSensors, 2021
At present, sensors are increasingly used in all kinds of platforms, manned or unmanned, particularly in view of the emerging Internet of Things (IoT) [...]
Dimitris A. Gritzalis   +2 more
openaire   +3 more sources

Cybersecurity in Russia [PDF]

open access: yesInternational Cybersecurity Law Review, 2021
Cybersecurity in Russia is not a standalone concept but an integral part of national information security, which influences its legal status and applicable regulation, and determines its development trends. The purpose of this article is to outline the Russian approach to cybersecurity, describe the related legal framework, representative business ...
Olga Chislova, Marina Sokolova
openaire   +3 more sources

Cybersecurity [PDF]

open access: yesInternet Policy Review, 2020
Cite as Michael Veale and Ian Brown (2020) 'Cybersecurity' 9(4) Internet Policy Review Cybersecurity covers the broad range of technical and social issues that must be considered to protect networked information systems. The importance of the concept has increased as so many government, business, and day-to-day activities globally have moved online. It
Veale, Michael, Brown, Ian
openaire   +6 more sources

Cybersecurity

open access: yesITNOW, 2022
Abstract Dr Deepthi Ratnayake explains what the latest attacks tell us about ransomware’s ...
Liebetrau, Tobias, Monsees, Linda
openaire   +3 more sources

A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review

open access: yesItalian National Conference on Sensors, 2023
The emergence of the Internet of Things (IoT) technology has brought about tremendous possibilities, but at the same time, it has opened up new vulnerabilities and attack vectors that could compromise the confidentiality, integrity, and availability of ...
Usman Tariq   +3 more
semanticscholar   +1 more source

Cybersecurity Risk

open access: yesSSRN Electronic Journal, 2020
AbstractBased on textual analysis and a comparison of cybersecurity risk disclosures of firms that were hacked to others that were not, we propose a novel firm-level measure of cybersecurity risk for all U.S.-listed firms. We then examine whether cybersecurity risk is priced in the cross-section of stock returns.
Florackis, Chris   +3 more
openaire   +3 more sources

Cybersecurity Awareness [PDF]

open access: yes, 2021
Cybersecurity awareness can be viewed as the level of appreciation, understanding or knowledge of cybersecurity or information security aspects. Such aspects include cognizance of cyber risks and threats, but also appropriate protection measures.
openaire   +3 more sources

A companion to the preclinical common data elements for proteomics, lipidomics, and metabolomics data in rodent epilepsy models. A report of the TASK3‐WG4 omics working group of the ILAE/AES joint translational TASK force

open access: yesEpilepsia Open, EarlyView., 2022
Abstract The International League Against Epilepsy/American Epilepsy Society (ILAE/AES) Joint Translational Task Force established the TASK3 working groups to create common data elements (CDEs) for various preclinical epilepsy research disciplines.
Laura Bindila   +11 more
wiley   +1 more source

Encouraging Employee Engagement With Cybersecurity: How to Tackle Cyber Fatigue

open access: yesSAGE Open, 2021
Cybersecurity fatigue is a form of work disengagement specific to cybersecurity. It manifests as a weariness or aversion to cybersecurity-related workplace behaviors or advice and occurs as a result of prior overexposure to cybersecurity-related work ...
A. Reeves, P. Delfabbro, D. Calic
doaj   +1 more source

Home - About - Disclaimer - Privacy