Results 41 to 50 of about 196,474 (374)
Cybersecurity Risks in a Pandemic [PDF]
Cybersecurity threats are estimated to cost the world US $6 trillion a year by 2021, and the number of attacks has increased five-fold after COVID-19. Although there is substantial literature on the threats technological vulnerabilities have on the health care industry, less research exists on how pandemics like COVID-19 are opportunistic for ...
Christina Meilee Williams+2 more
openaire +4 more sources
CYBERSECURITY IN BANKING: A GLOBAL PERSPECTIVE WITH A FOCUS ON NIGERIAN PRACTICES
The paper review cybersecurity practices in banking, with a specific focus on Nigerian banks. Cybersecurity has become a paramount concern in the banking industry worldwide, given the escalating frequency and sophistication of cyber threats.
Azeez Olanipekun Hassan+5 more
semanticscholar +1 more source
TCCCD: Triplet-Based Cross-Language Code Clone Detection
Code cloning is a common practice in software development, where developers reuse existing code to accelerate programming speed and enhance work efficiency. Existing clone-detection methods mainly focus on code clones within a single programming language.
Yong Fang+3 more
doaj +1 more source
Multinational perspectives on information technology from academia and industry [PDF]
As the term \u27information technology\u27 has many meanings for various stakeholders and continues to evolve, this work presents a comprehensive approach for developing curriculum guidelines for rigorous, high quality, bachelor\u27s degree programs in ...
Alrumaih, Hala+12 more
core +2 more sources
Cybersecurity regulation: cybersecurity certification of operational technologies
The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification.
openaire +4 more sources
Parametric design method of building structured cabling system oriented to data mining
This paper puts forward the method of secondary development and design software through the research of building structured cabling system (SCS), and uses data mining technology to carry out parametric design of building SCS. Then, the feasibility of the design is tested by comparing the data of the traditional design and the parametric design ...
Bing Wang, Wei Yue
wiley +1 more source
This study delves into the integration of Artificial Intelligence (AI) in cybersecurity measures within smart cities, aiming to uncover both the challenges and opportunities this fusion presents.
Ezekiel Onyekachukwu Udeh+3 more
semanticscholar +1 more source
Elevator dynamic monitoring and early warning system based on machine learning algorithm
In order to monitor and warn the elevator dynamics, in this work, the machine learning algorithm is introduced, and the particle swarm algorithm is used to perfect the model. The model is optimised, and the experimental comparison shows that the optimisation of the model parameters can further improve the accuracy of the elevator load prediction. Then,
Shuai Zhang, Qiangguo Yin, Jinlong Wang
wiley +1 more source
Cybersecurity in the Classroom: Bridging the Gap Between Computer Access and Online Safety [PDF]
According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These
Malecki, Andrew
core +4 more sources
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina+4 more
wiley +1 more source