Results 301 to 310 of about 164,979 (324)

Leveraging MDS2 and SBOM data for LLM-assisted vulnerability analysis of medical devices. [PDF]

open access: yesComput Struct Biotechnol J
Stein S   +3 more
europepmc   +1 more source

Resilience in the Face of Disruption: Viewpoint on the CrowdStrike Incident in July 2024.

open access: yesJMIR Med Inform
Dennis CR   +7 more
europepmc   +1 more source

Humanitarian perspective of cybersecurity and cybersecurity governance

2017 IST-Africa Week Conference (IST-Africa), 2017
The state of national security is an evolving concern, as entities and organizations may be aware of the security of their information and their asset — the same can unfortunately not be said about the risks they may face. These risks are not only limited to the non-existence of security procedures.
S.H. von Solms, Rossouw De Bruin
openaire   +2 more sources

A Cybersecurity Nightmare

Scientific American, 2011
An opinion piece is presented on cybersecurity, malware, and scanning computer systems. The author argues that malware can be incredibly dangerous but is extremely difficult to scan for, since it does not have identifying characteristics, can hide infect devices including laptops, smartphones, and servers, and cannot be recognized by examining lines of
openaire   +3 more sources

cybersecurity

The advanced world has changed the way people, organizations, and governments associated, conduct commerce, and store touchy information. With the developing dependence on computerized advances such as cloud computing, e-commerce, social media, and the Web of Things , cybersecurity has ended up a squeezing concern.
openaire   +2 more sources

AI in Cybersecurity

2019
This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyber threat intelligence, offering strategic defense mechanisms for malware, addressing cyber crime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures.
openaire   +2 more sources

Home - About - Disclaimer - Privacy