Results 231 to 240 of about 164,979 (324)
Remote and Telerobotic Ultrasound Imaging. [PDF]
Monsky WL +3 more
europepmc +1 more source
Integrating Top-down and Bottom-up Cybersecurity Guidance using XML [PDF]
Joshua Lubell
openalex +1 more source
Bank Technology M&As and Market Valuation: Lessons From the COVID‐19 Shock
ABSTRACT We study listed banks in 27 OECD countries that executed technology mergers and acquisitions (M&As) over the two decades spanning 1998–2019 and assess their market performance during the COVID‐19 pandemic. Our findings reveal a significant relationship between past bank technology acquisitions and market valuation when digital transformation ...
Claudia Curi +2 more
wiley +1 more source
Integrating AI in security information and event management for real time cyber defense. [PDF]
Khan S +4 more
europepmc +1 more source
Crossing Point of Artificial Intelligence in Cybersecurity
Praveen Kumar Donepudi
openalex +2 more sources
ABSTRACT The emphasis on digitalization has significantly affected public sector organizations, including municipalities, as they strive to improve operational efficiency, transparency, and public value. Nevertheless, historical examples reveal high failure rates in digitalization projects, often resulting in delays, financial losses, and political ...
Joakim Engström +2 more
wiley +1 more source
Cyber resilience conceptual model for European Union NIS2 standards implementation in Slovakia. [PDF]
Ristvej J +5 more
europepmc +1 more source
Power System Reliability Evaluation With SCADA Cybersecurity Considerations
Yichi Zhang +3 more
openalex +1 more source
ABSTRACT In recent decades, digital transformation has proliferated and prevailed among firms, profoundly affecting their operations, investments, and information management. To the extent that applying digital technologies has pros and cons to business activities, its implications for future firm performance remain uncertain to stock market ...
Guanming He +2 more
wiley +1 more source
Power utility automation cybersecurity: IEC 61850 specification of an intrusion detection function
Maëlle Kabir-Querrec +3 more
openalex +2 more sources

