Results 41 to 50 of about 196,474 (374)

Cybersecurity Risks in a Pandemic [PDF]

open access: yesJournal of Medical Internet Research, 2020
Cybersecurity threats are estimated to cost the world US $6 trillion a year by 2021, and the number of attacks has increased five-fold after COVID-19. Although there is substantial literature on the threats technological vulnerabilities have on the health care industry, less research exists on how pandemics like COVID-19 are opportunistic for ...
Christina Meilee Williams   +2 more
openaire   +4 more sources

CYBERSECURITY IN BANKING: A GLOBAL PERSPECTIVE WITH A FOCUS ON NIGERIAN PRACTICES

open access: yesComputer Science & IT Research Journal
The paper review cybersecurity practices in banking, with a specific focus on Nigerian banks. Cybersecurity has become a paramount concern in the banking industry worldwide, given the escalating frequency and sophistication of cyber threats.
Azeez Olanipekun Hassan   +5 more
semanticscholar   +1 more source

TCCCD: Triplet-Based Cross-Language Code Clone Detection

open access: yesApplied Sciences, 2023
Code cloning is a common practice in software development, where developers reuse existing code to accelerate programming speed and enhance work efficiency. Existing clone-detection methods mainly focus on code clones within a single programming language.
Yong Fang   +3 more
doaj   +1 more source

Multinational perspectives on information technology from academia and industry [PDF]

open access: yes, 2015
As the term \u27information technology\u27 has many meanings for various stakeholders and continues to evolve, this work presents a comprehensive approach for developing curriculum guidelines for rigorous, high quality, bachelor\u27s degree programs in ...
Alrumaih, Hala   +12 more
core   +2 more sources

Cybersecurity regulation: cybersecurity certification of operational technologies

open access: yesTechnology audit and production reserves, 2021
The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification.
openaire   +4 more sources

Parametric design method of building structured cabling system oriented to data mining

open access: yesIET Networks, EarlyView., 2022
This paper puts forward the method of secondary development and design software through the research of building structured cabling system (SCS), and uses data mining technology to carry out parametric design of building SCS. Then, the feasibility of the design is tested by comparing the data of the traditional design and the parametric design ...
Bing Wang, Wei Yue
wiley   +1 more source

The integration of artificial intelligence in cybersecurity measures for sustainable finance platforms: An analysis

open access: yesComputer Science & IT Research Journal
This study delves into the integration of Artificial Intelligence (AI) in cybersecurity measures within smart cities, aiming to uncover both the challenges and opportunities this fusion presents.
Ezekiel Onyekachukwu Udeh   +3 more
semanticscholar   +1 more source

Elevator dynamic monitoring and early warning system based on machine learning algorithm

open access: yesIET Networks, EarlyView., 2022
In order to monitor and warn the elevator dynamics, in this work, the machine learning algorithm is introduced, and the particle swarm algorithm is used to perfect the model. The model is optimised, and the experimental comparison shows that the optimisation of the model parameters can further improve the accuracy of the elevator load prediction. Then,
Shuai Zhang, Qiangguo Yin, Jinlong Wang
wiley   +1 more source

Cybersecurity in the Classroom: Bridging the Gap Between Computer Access and Online Safety [PDF]

open access: yes, 2018
According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These
Malecki, Andrew
core   +4 more sources

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy