Results 301 to 310 of about 164,979 (324)
Leveraging MDS2 and SBOM data for LLM-assisted vulnerability analysis of medical devices. [PDF]
Stein S +3 more
europepmc +1 more source
BAKE: a novel framework for iterative security design for identifying criminally-exploitable vulnerabilities in biotechnology products. [PDF]
Elgabry M +3 more
europepmc +1 more source
Resilience in the Face of Disruption: Viewpoint on the CrowdStrike Incident in July 2024.
Dennis CR +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Humanitarian perspective of cybersecurity and cybersecurity governance
2017 IST-Africa Week Conference (IST-Africa), 2017The state of national security is an evolving concern, as entities and organizations may be aware of the security of their information and their asset — the same can unfortunately not be said about the risks they may face. These risks are not only limited to the non-existence of security procedures.
S.H. von Solms, Rossouw De Bruin
openaire +2 more sources
Scientific American, 2011
An opinion piece is presented on cybersecurity, malware, and scanning computer systems. The author argues that malware can be incredibly dangerous but is extremely difficult to scan for, since it does not have identifying characteristics, can hide infect devices including laptops, smartphones, and servers, and cannot be recognized by examining lines of
openaire +3 more sources
An opinion piece is presented on cybersecurity, malware, and scanning computer systems. The author argues that malware can be incredibly dangerous but is extremely difficult to scan for, since it does not have identifying characteristics, can hide infect devices including laptops, smartphones, and servers, and cannot be recognized by examining lines of
openaire +3 more sources
The advanced world has changed the way people, organizations, and governments associated, conduct commerce, and store touchy information. With the developing dependence on computerized advances such as cloud computing, e-commerce, social media, and the Web of Things , cybersecurity has ended up a squeezing concern.
openaire +2 more sources
openaire +2 more sources
2019
This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyber threat intelligence, offering strategic defense mechanisms for malware, addressing cyber crime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures.
openaire +2 more sources
This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyber threat intelligence, offering strategic defense mechanisms for malware, addressing cyber crime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures.
openaire +2 more sources

