Results 71 to 80 of about 1,936 (160)

Artificial intelligence in blood donor management: A narrative review

open access: yesVox Sanguinis, EarlyView.
Abstract Blood transfusions are vital in health care, yet maintaining an adequate and safe blood supply remains a significant challenge. To address blood donation–associated challenges, this review explores how integrating artificial intelligence (AI) technologies can improve donor recruitment, retention and management.
Maha A. Badawi
wiley   +1 more source

Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges

open access: yesInternet of Things and Cyber-Physical Systems
Ransomware attacks have emerged as one of the most significant cyberthreats faced by organizations worldwide. In recent years, ransomware has also started to target critical infrastructure and Cyber-Physical Systems (CPS) such as industrial control ...
Mourad Benmalek
doaj   +1 more source

An interorganizational task force for disasters affecting US blood supply

open access: yesVox Sanguinis, EarlyView.
Abstract Background and Objectives The US Interorganizational Task Force for Domestic Disasters and Acts of Terrorism (Interorganizational Disaster Task Force [IDTF]) is coordinated by the Association for the Advancement of Blood & Biotherapies (AABB).
Glenn Ramsey, Frank Berry
wiley   +1 more source

Cybersecurity Assurance for SMEs: A Conceptual Framework Integrating Organizational Culture, Fraud Risk Management and Forensic Accounting

open access: yesCanadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l'Administration, Volume 43, Issue 1, March 2026.
ABSTRACT As digitalization accelerates across the global economy, small and medium enterprises (SMEs) face increasing exposure to cybersecurity threats, not due to flaws in external platforms, but because of internal organizational vulnerabilities. This paper presents a conceptual framework that integrates the resource‐based view (RBV) and dynamic ...
Ifedapo Francis Awolowo   +4 more
wiley   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, Volume 14, Issue 3, Page 1431-1455, March 2026.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

Ransomware Modeling Based on a Process Mining Approach

open access: yesInternational Journal of Information and Communication Technology Research, 2022
Ransomware attacks are taking advantage of the ongoing coronavirus pandemics and attacking the vulnerable systems in the health sector. Modeling ransomware attacks help to identify and simulate attacks against security environments, using likely ...
Ebrahim Mahdipour   +2 more
doaj  

A cybersecurity risk analysis framework for systems with artificial intelligence components

open access: yesInternational Transactions in Operational Research, Volume 33, Issue 2, Page 798-825, March 2026.
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho   +3 more
wiley   +1 more source

Risk‐Resilience Feedback to Assure Critical Societal Functions

open access: yesRisk Analysis, Volume 46, Issue 3, March 2026.
ABSTRACT Increase in compound natural and man‐made extreme events, and growing interconnectedness of critical societal functions emphasize further understanding of interactions between elements of risk and resilience. While conceptual frameworks have mapped quantified risks to the failure of critical societal functions, feedback from failure and ...
Samrat Chatterjee   +3 more
wiley   +1 more source

Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm

open access: yesComputers, 2019
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ...
S. H. Kok   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy