Results 271 to 280 of about 196,474 (374)
Power utility automation cybersecurity: IEC 61850 specification of an intrusion detection function
Maëlle Kabir-Querrec+3 more
openalex +2 more sources
Integrating Top-down and Bottom-up Cybersecurity Guidance using XML [PDF]
Joshua Lubell
openalex +1 more source
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources. [PDF]
Alharbi H, Hur A, Alkahtani H, Ahmad HF.
europepmc +1 more source
ABSTRACT A “whole community” strategy is central to disaster management and community resilience in the United States. However, the specific means by which community‐level stakeholders in the private and nonprofit sectors function as partners with government agencies in providing key disaster‐related services are currently underexamined.
Suyang Yu, Brian J. Gerber
wiley +1 more source
Enhancing cybersecurity through script development using machine and deep learning for advanced threat mitigation. [PDF]
Kim TH+5 more
europepmc +1 more source
Intelligent Cybersecurity Agents [Guest editors' introduction] [PDF]
José M. Such+3 more
openalex +1 more source
Managing Data Sovereignty: An Organizational Competence for Successful Open Value Creation
ABSTRACT Managing big data benefits organizations via efficient and effective data‐driven decision making, productivity gains, customization potential, or innovation opportunities. Data‐driven innovation opportunities are particularly valuable in open value creation (OVC), that is, the collaboration of independent stakeholders who open their boundaries
Lukas Moschko+2 more
wiley +1 more source
Deep learning for network security: an Attention-CNN-LSTM model for accurate intrusion detection. [PDF]
Alashjaee AM.
europepmc +1 more source