Results 71 to 80 of about 196,474 (374)
A novel risk assessment approach that integrates the fuzzy set theory and Z‐numbers with multicriteria decision‐making techniques (Delphi, decision‐making trial and evaluation laboratory, analytic network process, and VIseKriterijumska Optimizacija I Kompromisno Resenje) to manage uncertainty and prioritize human–robot collaboration risks. A real‐world
Emine Bozkus, İhsan Kaya
wiley +1 more source
Unbalanced Web Phishing Classification through Deep Reinforcement Learning
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are ...
Antonio Maci+3 more
doaj +1 more source
“Passwords protect my stuff” - a study of children’s password practices [PDF]
Children use technology from a very young age and often have to authenticate. The goal of this study is to explore children’s practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world’s cyber posture and
Choong, Yee-Yin+3 more
core +2 more sources
Machine learning in cybersecurity: A review of threat detection and defense mechanisms
The cybersecurity concerns get increasingly intricate as the digital world progresses. In light of the increasing complexity of cyber threats, it is imperative to develop and implement advanced and flexible security strategies.
Temitayo Oluwaseun Abrahams+3 more
semanticscholar +1 more source
Abstract In today's digital age, misinformation propagates rapidly through digital channels, blurring the lines between truth and fiction, and challenging the foundations of trust in information sources. Although affecting all spheres of life, misinformation poses a significant threat to workers highlighting a critical intersection between ...
Ashwani Malhotra+4 more
wiley +1 more source
The Role of AI in Cybersecurity: Addressing Threats in the Digital Age
In the contemporary digital landscape, cybersecurity stands as a paramount concern due to the increasing sophistication and frequency of cyber threats.
Nicolas Guzman Camacho
semanticscholar +1 more source
Machine Learning in Cybersecurity: Techniques and Challenges
In the computer world, data science is the force behind the recent dramatic changes in cybersecurity's operations and technologies. The secret to making a security system automated and intelligent is to extract patterns or insights related to security ...
J. Bharadiya
semanticscholar +1 more source
Digital Technologies: Description, Classification, and Links to Circular Economy
ABSTRACT Digital technologies (DTs) and circular economy (CE) are currently two topics that are expected to contribute significantly to sustainable development, and digitization is generally considered a key enabler of CE. However, most studies only cover the most known Industry 4.0 technologies, and very limited research detailing how DTs can support ...
Laura Piedra‐Muñoz+3 more
wiley +1 more source
System Approach to Coherent Cybersecurity Strategy
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity ...
Daniel MICHALSKI
doaj +1 more source
Antecedents and Consequences of Cybersecurity Awareness: A Case Study for Turkish Maritime Sector [PDF]
Cybersecurity awareness has become an important issue in maritime transportation as well as in other sectors. In this paper, after analyzing maritime cybersecurity literature, it is aimed to understand the factors of antecedents and consequences of ...
Pelin BOLAT, Gizem KAYİŞOĞLU
doaj +1 more source