Results 81 to 90 of about 21,893 (200)

Balancing Digital Transformation and Modernization: Pathways for Public Managers

open access: yesPublic Administration Review, Volume 86, Issue 3, Page 610-625, May/June 2026.
ABSTRACT This study examines the interplay between digital modernization and transformation in the public sector, challenging the notion that they are mutually exclusive strategies. Through interviews with public sector leaders, we find that modernization and transformation can be jointly implemented rather than managed as competing efforts.
Marc E. B. Picavet   +4 more
wiley   +1 more source

Lightweight and Explainable Early Ransomware Detection Using Dynamic API‐Call Features and Ensemble Machine Learning

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This study presents a lightweight and explainable ransomware detection framework using dynamic API‐call features and ensemble machine learning. The LightGBM model achieves high accuracy (AUC = 0.9937) with low false positives. SHAP‐based feature importance reveals key API behaviors enabling interpretable, efficient, and deployment‐ready ransomware ...
Zain ul Abideen Khan   +4 more
wiley   +1 more source

Access Control in Healthcare IoT: A Comprehensive Survey

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir   +3 more
wiley   +1 more source

From Headlines to Supply Lines: Paradoxes in the Digital News Media Supply Chain

open access: yesTransportation Journal, Volume 65, Issue 2, Spring 2026.
ABSTRACT Supply chain management has traditionally focused on networks of decision‐making nodes that manage the physical flow of goods. In recent years, attention has increased to service supply chains. One underexplored example is that of news media, which has undergone a profound transformation due to digitalization.
Derek Dubois   +2 more
wiley   +1 more source

Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]

open access: yes, 2018
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca   +1 more
core  

Ransomware Modeling Based on a Process Mining Approach

open access: yesInternational Journal of Information and Communication Technology Research, 2022
Ransomware attacks are taking advantage of the ongoing coronavirus pandemics and attacking the vulnerable systems in the health sector. Modeling ransomware attacks help to identify and simulate attacks against security environments, using likely ...
Ebrahim Mahdipour   +2 more
doaj  

The Internet of Things Connectivity Binge: What are the Implications? [PDF]

open access: yes, 2017
Despite wide concern about cyberattacks, outages and privacy violations, most experts believe the Internet of Things will continue to expand successfully the next few years, tying machines to machines and linking people to valuable resources, services ...
Janna Anderson, Lee Rainie
core  

Ransomware

open access: yesDelikt en Delinkwent, 2020
Usman Javed Butt, Arvind Kumar
  +5 more sources

AI-assisted ransomware:operating principles and defense methods

open access: yes物联网学报
With the rapid development of the digital economy, cybersecurity risks have become increasingly severe. According to relevant reports, ransomware has emerged as one of the most destructive threats in cyberspace.
Li Yeshen   +5 more
doaj   +2 more sources

Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm

open access: yesComputers, 2019
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ...
S. H. Kok   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy