Results 31 to 40 of about 79,039 (285)

Transnational Cyber Governance for Risk Management in the Gas Sector: Exploring the Potential of G7 Cooperation

open access: yesGases
At the Group of Seven (G7) summit held on 13–15 June in 2024, the Group’s leaders committed to establishing a collective cyber security framework and reinforcing the work of the cyber security working group to manage the risks targeting energy systems ...
Megghi Pengili, Slawomir Raszewski
doaj   +1 more source

Challenges and Opportunities for Conducting Dynamic Risk Assessments in Medical IoT

open access: yesApplied Sciences, 2023
Modern medical devices connected to public and private networks require additional layers of communication and management to effectively and securely treat remote patients.
Ricardo M. Czekster   +4 more
doaj   +1 more source

Investigating Security Awareness and Incident Reporting levels at Mbarara University of Science and Technology

open access: yesIndonesian Journal of Innovation and Applied Sciences
Higher learning institutions confront heightened cyber threats due to the value of their data, necessitating a robust security culture. In addition to cyber threats, various security incidents cause danger to devices and personal belongings on campuses ...
Thomas Mbonimpa   +3 more
doaj   +1 more source

Institutional Foundations for Cyber Security: Current Responses and New Challenges [PDF]

open access: yes, 2014
Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for almost everyone in the developed ...
Choucri, Nazli   +2 more
core  

Democracy and Digital Authoritarianism: An Assessment of the EU’s External Engagement in the Promotion and Protection of Internet Freedom. College of Europe EU Diplomacy Paper 01/2020 [PDF]

open access: yes, 2020
The past decade has seen a gradual global increase in digital authoritarianism. Internet shutdowns, online censorship, mass surveillance and violations of privacy rights have all become more frequent in parts of the world where citizens are not ...
Garside, Susanna
core  

Systematic Benchmarking of a Noise‐Tolerant Conductive Hydrogel Electrode for Epidermal Bioelectronics

open access: yesAdvanced Science, EarlyView.
General schematic of the approach. Abstract Conventional Silver/Silver Chloride (Ag/AgCl) electrodes remain the clinical standard for electrophysiological monitoring but are hindered by poor skin conformity, mechanical rigidity, and signal degradation, particularly under motion or sweat.
Nazmi Alsaafeen   +11 more
wiley   +1 more source

Cybersecurity Politics in Building Cyber Sovereignty in Indonesia Through Strengthening the Role of the National Cyber and Crypto Agency

open access: yesSociety
In an increasingly interconnected digital world, cybersecurity has emerged as a crucial element of national resilience and global political competition.
Muhammad Prakoso Aji
doaj   +1 more source

The Position of the New Security Concept in China`s Foreign Policy – Case Study on the Shanghai Cooperation Organization [PDF]

open access: yesContemporary Chinese Political Economy and Strategic Relations: An International Journal, 2021
This paper analyzes the position of the New Security Concept (NSC) in China’s foreign policy. The Shanghai Cooperation Organization (SCO) has been selected as a case study, because in China’s Position Paper on the New Security Concept the SCO has been ...
Slobodan Popovic, Ljiljana Stevic
doaj  

A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs [PDF]

open access: yes, 2015
Cyber security is one of the most significant technical challenges in current times. Detecting adversarial activities, prevention of theft of intellectual properties and customer data is a high priority for corporations and government agencies around the
Agarwal, Khushbu   +4 more
core  

Trusted CI Experiences in Cybersecurity and Service to Open Science

open access: yes, 2019
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew   +18 more
core   +1 more source

Home - About - Disclaimer - Privacy