Results 41 to 50 of about 44,516 (50)
Some of the next articles are maybe not open access.

Developing comprehensive cybersecurity frameworks for protecting green infrastructure: Conceptual models and practical applications

GSC Advanced Research and Reviews
This study investigates the critical intersection of cybersecurity and green infrastructure (GI), aiming to elucidate the challenges, opportunities, and strategic approaches necessary for safeguarding these essential systems against cyber threats ...
Adebimpe Bolatito   +3 more
semanticscholar   +1 more source

Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey

IEEE/CAA Journal of Automatica Sinica, 2022
With the booming of cyber attacks and cyber criminals against cyber-physical systems (CPSs), detecting these attacks remains challenging. It might be the worst of times, but it might be the best of times because of opportunities brought by machine ...
Jun Zhang   +5 more
semanticscholar   +1 more source

Current trends in AI and ML for cybersecurity: A state-of-the-art survey

Cogent Engineering, 2023
This paper provides a comprehensive survey of the state-of-the-art use of Artificial Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity.
Nachaat Mohamed
semanticscholar   +1 more source

Cybersecurity Challenges for Manufacturing Systems 4.0: Assessment of the Business Impact Level

IEEE transactions on engineering management, 2023
An ever-growing number of companies are moving toward the Industry 4.0 paradigm, adopting a range of advanced technologies (e.g., smart sensors, big data analytics, and cloud computing) and networking their manufacturing systems.
A. Corallo   +3 more
semanticscholar   +1 more source

LSTM Recurrent Neural Networks for Cybersecurity Named Entity Recognition

arXiv.org
The automated and timely conversion of cybersecurity information from unstructured online sources, such as blogs and articles to more formal representations has become a necessity for many applications in the domain nowadays.
Houssem Gasmi, Abdelaziz Bouras
semanticscholar   +1 more source

Large Language Models in Cybersecurity: State-of-the-Art

International Conference on Information Systems Security and Privacy
The rise of Large Language Models (LLMs) has revolutionized our comprehension of intelligence bringing us closer to Artificial Intelligence. Since their introduction, researchers have actively explored the applications of LLMs across diverse fields ...
Farzad Nourmohammadzadeh Motlagh   +5 more
semanticscholar   +1 more source

When LLMs Meet Cybersecurity: A Systematic Literature Review

Cybersecur.
The rapid development of large language models (LLMs) has opened new avenues across various fields, including cybersecurity, which faces an evolving threat landscape and demand for innovative technologies.
Jie Zhang   +5 more
semanticscholar   +1 more source

Best practices in cybersecurity for green building management systems: Protecting sustainable infrastructure from cyber threats

International Journal of Science and Research Archive
This study explores the critical intersection of cybersecurity and sustainable infrastructure, with a focus on Green Building Management Systems (GBMS).
Adebimpe Bolatito Ige   +2 more
semanticscholar   +1 more source

Aligning sustainable development goals with cybersecurity strategies: Ensuring a secure and sustainable future

GSC Advanced Research and Reviews
This study explores the critical intersection between cybersecurity and sustainable development, aiming to understand how cybersecurity measures can support the achievement of the Sustainable Development Goals (SDGs).
Adebimpe Bolatito   +3 more
semanticscholar   +1 more source

Investigate the multifaceted dynamics of cybersecurity practices and their impact on the quality of e-government services: evidence from the KSA

Digital Policy Regulation and Governance
Purpose The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats.
A. M. Al-Hawamleh
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy