Results 81 to 90 of about 181,953 (301)
Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations
The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources.
Vedran Dakić +3 more
doaj +1 more source
National Security Space Launch [PDF]
The United States Space Force’s National Security Space Launch (NSSL) program, formerly known as the Evolved Expendable Launch Vehicle (EELV) program, was first established in 1994 by President William J.
Zhang, Michelle
core
Digital Twin (DT) technology enhances building energy efficiency by enabling continuous monitoring, predictive maintenance, and operational optimization within Building Energy Management Systems. Through real‐time data integration and simulation, DTs provide dynamic feedback loops that optimize performance, reduce operational costs, and improve ...
Suqi Wang +6 more
wiley +1 more source
Malicious User Experience Design Research for Cybersecurity
This paper explores the factors and theory behind the user-centered research that is necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context.
Sharevski, Filipo +2 more
core +1 more source
The graphical abstract presents the concept of applying machine‐learning algorithms to assess the performance of photovoltaic modules. Data from solar panels are fed to surrogates of intelligent models, to assess the following performance metrics: identifying faults, quantifying energy production and trend degradation over time. The combination of data
Nangamso Nathaniel Nyangiwe +3 more
wiley +1 more source
Law Firm Cybersecurity: The State of Preventative and Remedial Regulation Governing Data Breaches in the Legal Profession [PDF]
With the looming threat of the next hacking scandal, data protection efforts in law firms are becoming increasingly crucial in maintaining client confidentiality.
Tarr, Madelyn
core +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities [PDF]
In spite of the growing importance of software security and the industry demand for more cyber security expertise in the workforce, the effect of security education and experience on the ability to assess complex software security problems has only been ...
Allodi, Luca +3 more
core +2 more sources
A Cybersecurity Threat Profile for a Connected Lighting System
Paul Francik +6 more
openalex +1 more source

