Results 61 to 70 of about 196,474 (374)

Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity

open access: yesSustainability, 2023
Amidst the rapid advancements in the digital landscape, the convergence of digitization and cyber threats presents new challenges for organizational security. This article presents a comprehensive framework that aims to shape the future of cyber security.
Muhammad Fakhrul Safitra   +2 more
semanticscholar   +1 more source

A Detailed Comprehensive Role of Digital Technologies in Green Finance Initiative for Net‐Zero Energy Transition

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
This study aims to provide actionable recommendations for leveraging digital innovation for the achievement of scalable, equitable, and transparent Net Zero Energy Transition by offering actionable recommendations. As a result of this comprehensive analysis, the review highlights the critical interplay between digital technologies and GF as vital ...
Furkan Ahmad   +3 more
wiley   +1 more source

A Neural Network-Based Approach for Cryptographic Function Detection in Malware

open access: yesIEEE Access, 2020
Cryptographic technology has been commonly used in malware for hiding their static characteristics and malicious behaviors to avoid the detection of anti-virus engines and counter the reverse analysis from security researchers.
Li Jia   +5 more
doaj   +1 more source

Cybersecurity dynamics

open access: yesProceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
2 ...
openaire   +3 more sources

Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for Internet of Things

open access: yesIEEE Internet of Things Journal, 2022
Decentralized paradigm in the field of cybersecurity and machine learning (ML) for the emerging Internet of Things (IoT) has gained a lot of attention from the government, academia, and industries in recent years. Federated cybersecurity (FC) is regarded
Bimal Ghimire, D. Rawat
semanticscholar   +1 more source

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Domain knowledge free cloud-IDS with lightweight embedding method

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
The expansion of the cloud computing market has provided a breakthrough in efficiently storing and managing data for individuals and companies. As personal and corporate data move to the cloud, diverse attacks targeting the cloud have also increased for ...
Yongsik Kim, Gunho Park, Huy Kang Kim
doaj   +1 more source

Metamorphic Testing for Cybersecurity [PDF]

open access: yesComputer, 2016
Testing is a major approach for the detection of software defects, including vulnerabilities in security features. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct negative testing as well as to alleviate the oracle problem in the testing of security ...
Chen, Tsong Yueh   +6 more
openaire   +5 more sources

CYBERSECURITY CHALLENGES IN THE AGE OF AI: THEORETICAL APPROACHES AND PRACTICAL SOLUTIONS

open access: yesComputer Science & IT Research Journal
In the ever-evolving landscape of cybersecurity, the proliferation of artificial intelligence (AI) technologies introduces both promising advancements and daunting challenges.
Babajide Tolulope Familoni
semanticscholar   +1 more source

Towards Artificial Intelligence-Based Cybersecurity: The Practices and ChatGPT Generated Ways to Combat Cybercrime

open access: yesIraqi Journal for Computer Science and Mathematics, 2023
Today, cybersecurity is considered one of the most noteworthy topics that are circulated frequently among companies in order to protect their data from hacking operations. The emergence of cyberspace contributed to the growth of electronic systems. It is
Maad M. Mijwil   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy