Results 71 to 80 of about 1,936 (160)
Artificial intelligence in blood donor management: A narrative review
Abstract Blood transfusions are vital in health care, yet maintaining an adequate and safe blood supply remains a significant challenge. To address blood donation–associated challenges, this review explores how integrating artificial intelligence (AI) technologies can improve donor recruitment, retention and management.
Maha A. Badawi
wiley +1 more source
Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges
Ransomware attacks have emerged as one of the most significant cyberthreats faced by organizations worldwide. In recent years, ransomware has also started to target critical infrastructure and Cyber-Physical Systems (CPS) such as industrial control ...
Mourad Benmalek
doaj +1 more source
An interorganizational task force for disasters affecting US blood supply
Abstract Background and Objectives The US Interorganizational Task Force for Domestic Disasters and Acts of Terrorism (Interorganizational Disaster Task Force [IDTF]) is coordinated by the Association for the Advancement of Blood & Biotherapies (AABB).
Glenn Ramsey, Frank Berry
wiley +1 more source
ABSTRACT As digitalization accelerates across the global economy, small and medium enterprises (SMEs) face increasing exposure to cybersecurity threats, not due to flaws in external platforms, but because of internal organizational vulnerabilities. This paper presents a conceptual framework that integrates the resource‐based view (RBV) and dynamic ...
Ifedapo Francis Awolowo +4 more
wiley +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
Ransomware Modeling Based on a Process Mining Approach
Ransomware attacks are taking advantage of the ongoing coronavirus pandemics and attacking the vulnerable systems in the health sector. Modeling ransomware attacks help to identify and simulate attacks against security environments, using likely ...
Ebrahim Mahdipour +2 more
doaj
A cybersecurity risk analysis framework for systems with artificial intelligence components
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho +3 more
wiley +1 more source
Risk‐Resilience Feedback to Assure Critical Societal Functions
ABSTRACT Increase in compound natural and man‐made extreme events, and growing interconnectedness of critical societal functions emphasize further understanding of interactions between elements of risk and resilience. While conceptual frameworks have mapped quantified risks to the failure of critical societal functions, feedback from failure and ...
Samrat Chatterjee +3 more
wiley +1 more source
Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ...
S. H. Kok +3 more
doaj +1 more source

