Results 51 to 60 of about 196,474 (374)

The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security [PDF]

open access: yes, 2016
[Excerpt] This report examines congressional oversight of two strategies undertaken by Congress and the executive branch to strengthen the federal cybersecurity workforce: (1) initiatives to define and identify the federal cybersecurity workforce, and (2)
Francis, Kathryn A, Ginsberg, Wendy
core   +2 more sources

How does intellectual capital align with cyber security? [PDF]

open access: yes, 2019
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen   +2 more
core   +2 more sources

Кибербезопасность в образовательных сетях [PDF]

open access: yes, 2020
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr   +7 more
core   +1 more source

Cybersecurity and Sustainable Development

open access: yesProcedia Computer Science, 2021
Growing interdependencies between organizations lead them towards the creation of inter-organizational networks where cybersecurity and sustainable development have become one of the most important issues. The Environmental Goods and Services Sector (EGSS) is one of the fastest developing sectors of economy fueled by the growing relationships between
Sulich, Adam   +4 more
openaire   +3 more sources

The Role of Artificial Intelligence in Advancing Biosensor Technology: Past, Present, and Future Perspectives

open access: yesAdvanced Materials, EarlyView.
This review explores the transformative role of AI in biosensor technology and provides a holistic interdisciplinary perspective that covers a broader scope of AI‐enabled biosensor technologies across various sectors including healthcare, environmental monitoring, food safety, and agriculture. It also highlights the important role of novel materials in
Tuğba Akkaş   +4 more
wiley   +1 more source

A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity

open access: yes, 2014
Oil and gas drilling is based, increasingly, on operational technology, whose cybersecurity is complicated by several challenges. We propose a graphical model for cybersecurity risk assessment based on Adversarial Risk Analysis to face those challenges ...
Houmb, Siv Hilde   +2 more
core   +2 more sources

Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives

open access: yesIEEE Communications Surveys and Tutorials, 2023
Today’s cyber attacks have become more severe and frequent, which calls for a new line of security defenses to protect against them. The dynamic nature of new-generation threats, which are evasive, resilient, and complex, makes traditional security ...
Nan Sun   +6 more
semanticscholar   +1 more source

Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture

open access: yesAdvanced Science, EarlyView.
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang   +8 more
wiley   +1 more source

Optimal Job Role Allocation for Compliance With NCA-ECC Controls Using the Saudi Cybersecurity Workforce Framework

open access: yesIEEE Access
In today’s world of complex cybersecurity threats, it is crucial for organizations to follow strong security frameworks. This research introduces a new way to combine the National Cybersecurity Authority’s Essential Cybersecurity Controls ...
Rayan Mosli
doaj   +1 more source

A Characterization of Cybersecurity Posture from Network Telescope Data [PDF]

open access: yes, 2016
Data-driven understanding of cybersecurity posture is an important problem that has not been adequately explored. In this paper, we analyze some real data collected by CAIDA's network telescope during the month of March 2013.
Xu, Maochao, Xu, Shouhuai, Zhan, Zhenxin
core  

Home - About - Disclaimer - Privacy