Results 71 to 80 of about 196,474 (374)

A Fuzzy Risk Assessment Approach Based on Z‐Numbers for Enhancing Safety and Human‐Robot Collaboration in Automotive Sector

open access: yesAdvanced Intelligent Systems, EarlyView.
A novel risk assessment approach that integrates the fuzzy set theory and Z‐numbers with multicriteria decision‐making techniques (Delphi, decision‐making trial and evaluation laboratory, analytic network process, and VIseKriterijumska Optimizacija I Kompromisno Resenje) to manage uncertainty and prioritize human–robot collaboration risks. A real‐world
Emine Bozkus, İhsan Kaya
wiley   +1 more source

Unbalanced Web Phishing Classification through Deep Reinforcement Learning

open access: yesComputers, 2023
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are ...
Antonio Maci   +3 more
doaj   +1 more source

“Passwords protect my stuff” - a study of children’s password practices [PDF]

open access: yes, 2019
Children use technology from a very young age and often have to authenticate. The goal of this study is to explore children’s practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world’s cyber posture and
Choong, Yee-Yin   +3 more
core   +2 more sources

Machine learning in cybersecurity: A review of threat detection and defense mechanisms

open access: yesWorld Journal of Advanced Research and Reviews
The cybersecurity concerns get increasingly intricate as the digital world progresses. In light of the increasing complexity of cyber threats, it is imperative to develop and implement advanced and flexible security strategies.
Temitayo Oluwaseun Abrahams   +3 more
semanticscholar   +1 more source

The issues caused by misinformation—How workers and organizations deal with it: A systematic literature review

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract In today's digital age, misinformation propagates rapidly through digital channels, blurring the lines between truth and fiction, and challenging the foundations of trust in information sources. Although affecting all spheres of life, misinformation poses a significant threat to workers highlighting a critical intersection between ...
Ashwani Malhotra   +4 more
wiley   +1 more source

The Role of AI in Cybersecurity: Addressing Threats in the Digital Age

open access: yesJournal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023
In the contemporary digital landscape, cybersecurity stands as a paramount concern due to the increasing sophistication and frequency of cyber threats.
Nicolas Guzman Camacho
semanticscholar   +1 more source

Machine Learning in Cybersecurity: Techniques and Challenges

open access: yesEuropean journal of technology, 2023
In the computer world, data science is the force behind the recent dramatic changes in cybersecurity's operations and technologies. The secret to making a security system automated and intelligent is to extract patterns or insights related to security ...
J. Bharadiya
semanticscholar   +1 more source

Digital Technologies: Description, Classification, and Links to Circular Economy

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Digital technologies (DTs) and circular economy (CE) are currently two topics that are expected to contribute significantly to sustainable development, and digitization is generally considered a key enabler of CE. However, most studies only cover the most known Industry 4.0 technologies, and very limited research detailing how DTs can support ...
Laura Piedra‐Muñoz   +3 more
wiley   +1 more source

System Approach to Coherent Cybersecurity Strategy

open access: yesSafety & Defense, 2019
Cyber-attacks affect not only our daily lives, but also national security by influencing elections, the economy, and communication. This article is an attempt to give an answer to the question included in the topic “How to build a coherent cybersecurity ...
Daniel MICHALSKI
doaj   +1 more source

Antecedents and Consequences of Cybersecurity Awareness: A Case Study for Turkish Maritime Sector [PDF]

open access: yesJournal of Eta Maritime Science, 2019
Cybersecurity awareness has become an important issue in maritime transportation as well as in other sectors. In this paper, after analyzing maritime cybersecurity literature, it is aimed to understand the factors of antecedents and consequences of ...
Pelin BOLAT, Gizem KAYİŞOĞLU
doaj   +1 more source

Home - About - Disclaimer - Privacy