Results 31 to 40 of about 79,039 (285)
At the Group of Seven (G7) summit held on 13–15 June in 2024, the Group’s leaders committed to establishing a collective cyber security framework and reinforcing the work of the cyber security working group to manage the risks targeting energy systems ...
Megghi Pengili, Slawomir Raszewski
doaj +1 more source
Challenges and Opportunities for Conducting Dynamic Risk Assessments in Medical IoT
Modern medical devices connected to public and private networks require additional layers of communication and management to effectively and securely treat remote patients.
Ricardo M. Czekster +4 more
doaj +1 more source
Higher learning institutions confront heightened cyber threats due to the value of their data, necessitating a robust security culture. In addition to cyber threats, various security incidents cause danger to devices and personal belongings on campuses ...
Thomas Mbonimpa +3 more
doaj +1 more source
Institutional Foundations for Cyber Security: Current Responses and New Challenges [PDF]
Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for almost everyone in the developed ...
Choucri, Nazli +2 more
core
Democracy and Digital Authoritarianism: An Assessment of the EU’s External Engagement in the Promotion and Protection of Internet Freedom. College of Europe EU Diplomacy Paper 01/2020 [PDF]
The past decade has seen a gradual global increase in digital authoritarianism. Internet shutdowns, online censorship, mass surveillance and violations of privacy rights have all become more frequent in parts of the world where citizens are not ...
Garside, Susanna
core
General schematic of the approach. Abstract Conventional Silver/Silver Chloride (Ag/AgCl) electrodes remain the clinical standard for electrophysiological monitoring but are hindered by poor skin conformity, mechanical rigidity, and signal degradation, particularly under motion or sweat.
Nazmi Alsaafeen +11 more
wiley +1 more source
In an increasingly interconnected digital world, cybersecurity has emerged as a crucial element of national resilience and global political competition.
Muhammad Prakoso Aji
doaj +1 more source
The Position of the New Security Concept in China`s Foreign Policy – Case Study on the Shanghai Cooperation Organization [PDF]
This paper analyzes the position of the New Security Concept (NSC) in China’s foreign policy. The Shanghai Cooperation Organization (SCO) has been selected as a case study, because in China’s Position Paper on the New Security Concept the SCO has been ...
Slobodan Popovic, Ljiljana Stevic
doaj
A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs [PDF]
Cyber security is one of the most significant technical challenges in current times. Detecting adversarial activities, prevention of theft of intellectual properties and customer data is a high priority for corporations and government agencies around the
Agarwal, Khushbu +4 more
core
Trusted CI Experiences in Cybersecurity and Service to Open Science
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew +18 more
core +1 more source

