Results 81 to 90 of about 21,893 (200)
Balancing Digital Transformation and Modernization: Pathways for Public Managers
ABSTRACT This study examines the interplay between digital modernization and transformation in the public sector, challenging the notion that they are mutually exclusive strategies. Through interviews with public sector leaders, we find that modernization and transformation can be jointly implemented rather than managed as competing efforts.
Marc E. B. Picavet +4 more
wiley +1 more source
This study presents a lightweight and explainable ransomware detection framework using dynamic API‐call features and ensemble machine learning. The LightGBM model achieves high accuracy (AUC = 0.9937) with low false positives. SHAP‐based feature importance reveals key API behaviors enabling interpretable, efficient, and deployment‐ready ransomware ...
Zain ul Abideen Khan +4 more
wiley +1 more source
Access Control in Healthcare IoT: A Comprehensive Survey
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir +3 more
wiley +1 more source
From Headlines to Supply Lines: Paradoxes in the Digital News Media Supply Chain
ABSTRACT Supply chain management has traditionally focused on networks of decision‐making nodes that manage the physical flow of goods. In recent years, attention has increased to service supply chains. One underexplored example is that of news media, which has undergone a profound transformation due to digitalization.
Derek Dubois +2 more
wiley +1 more source
Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca +1 more
core
Ransomware Modeling Based on a Process Mining Approach
Ransomware attacks are taking advantage of the ongoing coronavirus pandemics and attacking the vulnerable systems in the health sector. Modeling ransomware attacks help to identify and simulate attacks against security environments, using likely ...
Ebrahim Mahdipour +2 more
doaj
The Internet of Things Connectivity Binge: What are the Implications? [PDF]
Despite wide concern about cyberattacks, outages and privacy violations, most experts believe the Internet of Things will continue to expand successfully the next few years, tying machines to machines and linking people to valuable resources, services ...
Janna Anderson, Lee Rainie
core
AI-assisted ransomware:operating principles and defense methods
With the rapid development of the digital economy, cybersecurity risks have become increasingly severe. According to relevant reports, ransomware has emerged as one of the most destructive threats in cyberspace.
Li Yeshen +5 more
doaj +2 more sources
Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ...
S. H. Kok +3 more
doaj +1 more source

