Results 81 to 90 of about 181,953 (301)

Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations

open access: yesJournal of Cybersecurity and Privacy
The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources.
Vedran Dakić   +3 more
doaj   +1 more source

National Security Space Launch [PDF]

open access: yes, 2020
The United States Space Force’s National Security Space Launch (NSSL) program, formerly known as the Evolved Expendable Launch Vehicle (EELV) program, was first established in 1994 by President William J.
Zhang, Michelle
core  

The Role of Digital Twin Technology in Enhancing Energy Efficiency in Buildings: A Systematic Literature Review

open access: yesEnergy Science &Engineering, EarlyView.
Digital Twin (DT) technology enhances building energy efficiency by enabling continuous monitoring, predictive maintenance, and operational optimization within Building Energy Management Systems. Through real‐time data integration and simulation, DTs provide dynamic feedback loops that optimize performance, reduce operational costs, and improve ...
Suqi Wang   +6 more
wiley   +1 more source

Malicious User Experience Design Research for Cybersecurity

open access: yes, 2018
This paper explores the factors and theory behind the user-centered research that is necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context.
Sharevski, Filipo   +2 more
core   +1 more source

Performance Monitoring of Photovoltaic Modules Using Machine‐Learning‐Based Solutions: A Survey of Current Trends

open access: yesEnergy Science &Engineering, EarlyView.
The graphical abstract presents the concept of applying machine‐learning algorithms to assess the performance of photovoltaic modules. Data from solar panels are fed to surrogates of intelligent models, to assess the following performance metrics: identifying faults, quantifying energy production and trend degradation over time. The combination of data
Nangamso Nathaniel Nyangiwe   +3 more
wiley   +1 more source

Law Firm Cybersecurity: The State of Preventative and Remedial Regulation Governing Data Breaches in the Legal Profession [PDF]

open access: yes, 2017
With the looming threat of the next hacking scandal, data protection efforts in law firms are becoming increasingly crucial in maintaining client confidentiality.
Tarr, Madelyn
core   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities [PDF]

open access: yes, 2018
In spite of the growing importance of software security and the industry demand for more cyber security expertise in the workforce, the effect of security education and experience on the ability to assess complex software security problems has only been ...
Allodi, Luca   +3 more
core   +2 more sources

A Cybersecurity Threat Profile for a Connected Lighting System

open access: gold, 2022
Paul Francik   +6 more
openalex   +1 more source

Home - About - Disclaimer - Privacy