Results 31 to 40 of about 79,967 (299)

MobileTrust: Secure Knowledge Integration in VANETs [PDF]

open access: yes, 2020
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes.
Demetriou, G.   +5 more
core   +2 more sources

Transnational Cyber Governance for Risk Management in the Gas Sector: Exploring the Potential of G7 Cooperation

open access: yesGases
At the Group of Seven (G7) summit held on 13–15 June in 2024, the Group’s leaders committed to establishing a collective cyber security framework and reinforcing the work of the cyber security working group to manage the risks targeting energy systems ...
Megghi Pengili, Slawomir Raszewski
doaj   +1 more source

Anthony Burke and Rita Parker: Global Insecurities: Futures of Global Chaos and Governance

open access: yesCzech Journal of International Relations, 2019
This innovative volume gathers some of the world’s best scholars to analyse the world’s collective international efforts to address globalised threats through global security governance.
Zemanová, Michaela
doaj   +5 more sources

Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things [PDF]

open access: yes, 2018
A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings. As intelligence is imported in embedded equipment, the system becomes able to provide smart services (e.g. control lights, airconditioning,
Alexandris, G.   +6 more
core   +1 more source

Investigating Security Awareness and Incident Reporting levels at Mbarara University of Science and Technology

open access: yesIndonesian Journal of Innovation and Applied Sciences
Higher learning institutions confront heightened cyber threats due to the value of their data, necessitating a robust security culture. In addition to cyber threats, various security incidents cause danger to devices and personal belongings on campuses ...
Thomas Mbonimpa   +3 more
doaj   +1 more source

Institutional Foundations for Cyber Security: Current Responses and New Challenges [PDF]

open access: yes, 2014
Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for almost everyone in the developed ...
Choucri, Nazli   +2 more
core  

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Features requirement elicitation process for designing a chatbot application

open access: yesIET Networks, EarlyView., 2022
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari   +4 more
wiley   +1 more source

Cybersecurity Politics in Building Cyber Sovereignty in Indonesia Through Strengthening the Role of the National Cyber and Crypto Agency

open access: yesSociety
In an increasingly interconnected digital world, cybersecurity has emerged as a crucial element of national resilience and global political competition.
Muhammad Prakoso Aji
doaj   +1 more source

A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs [PDF]

open access: yes, 2015
Cyber security is one of the most significant technical challenges in current times. Detecting adversarial activities, prevention of theft of intellectual properties and customer data is a high priority for corporations and government agencies around the
Agarwal, Khushbu   +4 more
core  

Home - About - Disclaimer - Privacy