An intelligent deep representation learning with enhanced feature selection approach for cyberattack detection in internet of things enabled cloud environment. [PDF]
Alamro H +7 more
europepmc +1 more source
ABSTRACT This study investigates how external auditors use heuristics to resolve complex audit matters when using audit data analytics (ADA). The use of ADA technologies, tools, and applications has led to the emergence of many challenges for the auditing profession, including those related to cognitive heuristics and auditor skills.
Mohammed Alsaif +3 more
wiley +1 more source
Electronic health record market consolidation and implications for cybersecurity. [PDF]
Holmgren AJ, Apathy NC, Kanter GP.
europepmc +1 more source
Introduction to Enlightened Cybersecurity and Software Assurance Minitrack
Luanne Goldrich +2 more
openalex +1 more source
Editorial: Critical Infrastructures and Cybersecurity (June 2015) [PDF]
Chris McPhee, Dan Craigen, Steven Muegge
openalex +1 more source
The Insurance Data Security Model Law: Strengthening Cybersecurity Insurer-Policyholder Relationships and Protecting Consumers [PDF]
Idowu, Koyejo-Isaac
core +1 more source
ABSTRACT Using textual analysis of clients' qualitative corporate risk factor disclosures (RFDs) from firms' 10‐K filings, we investigate how RFDs influence auditors' assessments of client business risk (CBR), as reflected in their pricing and reporting behaviour. We find that auditors charge clients who disclose more extensive RFDs approximately 5%–7%
Sarowar Hossain, Ryan Zihang Peng
wiley +1 more source
An effectiveness of deep learning with fox optimizer-based feature selection model for securing cyberattack detection in IoT environments. [PDF]
Alkhonaini MA.
europepmc +1 more source
TIM Lecture Series – Three Collaborations Enabling Cybersecurity [PDF]
Deborah Frincke +4 more
openalex +1 more source
Cyber-Vulnerabilities & Public Health Emergency Response [PDF]
Cashwell, Glyn
core +1 more source

