Results 351 to 360 of about 196,474 (374)
Some of the next articles are maybe not open access.

Aligning sustainable development goals with cybersecurity strategies: Ensuring a secure and sustainable future

GSC Advanced Research and Reviews
This study explores the critical intersection between cybersecurity and sustainable development, aiming to understand how cybersecurity measures can support the achievement of the Sustainable Development Goals (SDGs).
Adebimpe Bolatito   +3 more
semanticscholar   +1 more source

Humanitarian perspective of cybersecurity and cybersecurity governance

2017 IST-Africa Week Conference (IST-Africa), 2017
The state of national security is an evolving concern, as entities and organizations may be aware of the security of their information and their asset — the same can unfortunately not be said about the risks they may face. These risks are not only limited to the non-existence of security procedures.
S.H. von Solms, Rossouw De Bruin
openaire   +2 more sources

Large Language Models in Cybersecurity: State-of-the-Art

International Conference on Information Systems Security and Privacy
The rise of Large Language Models (LLMs) has revolutionized our comprehension of intelligence bringing us closer to Artificial Intelligence. Since their introduction, researchers have actively explored the applications of LLMs across diverse fields ...
Farzad Nourmohammadzadeh Motlagh   +5 more
semanticscholar   +1 more source

When LLMs Meet Cybersecurity: A Systematic Literature Review

Cybersecur.
The rapid development of large language models (LLMs) has opened new avenues across various fields, including cybersecurity, which faces an evolving threat landscape and demand for innovative technologies.
Jie Zhang   +5 more
semanticscholar   +1 more source

Current trends in AI and ML for cybersecurity: A state-of-the-art survey

Cogent Engineering, 2023
This paper provides a comprehensive survey of the state-of-the-art use of Artificial Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity.
Nachaat Mohamed
semanticscholar   +1 more source

LSTM Recurrent Neural Networks for Cybersecurity Named Entity Recognition

arXiv.org
The automated and timely conversion of cybersecurity information from unstructured online sources, such as blogs and articles to more formal representations has become a necessity for many applications in the domain nowadays.
Houssem Gasmi, Abdelaziz Bouras
semanticscholar   +1 more source

Best practices in cybersecurity for green building management systems: Protecting sustainable infrastructure from cyber threats

International Journal of Science and Research Archive
This study explores the critical intersection of cybersecurity and sustainable infrastructure, with a focus on Green Building Management Systems (GBMS).
Adebimpe Bolatito   +3 more
semanticscholar   +1 more source

A Cybersecurity Nightmare

Scientific American, 2011
An opinion piece is presented on cybersecurity, malware, and scanning computer systems. The author argues that malware can be incredibly dangerous but is extremely difficult to scan for, since it does not have identifying characteristics, can hide infect devices including laptops, smartphones, and servers, and cannot be recognized by examining lines of
openaire   +3 more sources

Digital access and inclusion for SMEs in the financial services industry through Cybersecurity GRC: A pathway to safer digital ecosystems

Finance & Accounting Research Journal
The integration of digital technologies into the financial services industry has revolutionized how small and medium-sized enterprises (SMEs) access and utilize financial services. However, this digital transformation also brings heightened cybersecurity
Oluwatosin Abdul-Azeez   +2 more
semanticscholar   +1 more source

Cybersecurity matters

Nursing Management, 2018
How to safeguard patient and other sensitive ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy