Results 41 to 50 of about 114,652 (137)

Reinvigorating Conversation in Logistics and Supply Chains: A Cross‐Disciplinary Theoretical Toolkit for Disruptive Value Creation

open access: yesJournal of Business Logistics, Volume 47, Issue 1, January 2026.
ABSTRACT Contemporary logistics and supply chain management (L/SCM) face unprecedented disruption from emerging technologies, rising complexity, and escalating uncertainties, in which traditional approaches to value creation have limited reach. In this vein, this paper introduces a cross‐disciplinary theoretical toolkit that draws on unconventional (or
Maciel M. Queiroz   +2 more
wiley   +1 more source

Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity

open access: yesCybersecurity
In the realm of cybersecurity, the detection and analysis of obfuscated malware remain a critical challenge, especially in the context of memory dumps.
M. Hossain, Md Saiful Islam
semanticscholar   +1 more source

Blockchain for Artificial Intelligence (AI): enhancing compliance with the EU AI Act through distributed ledger technology. A cybersecurity perspective

open access: yesInternational Cybersecurity Law Review
The article aims to investigate the potential of blockchain technology in mitigating certain cybersecurity risks associated with artificial intelligence (AI) systems.
Simona Ramos, Joshua Ellul
semanticscholar   +1 more source

Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles

open access: yesMesopotamian Journal of CyberSecurity
Cutting-edge technologies have been widely employed in healthcare delivery, resulting in transformative advances and promising enhanced patient care, operational efficiency, and resource usage.
Guma Ali, Maad M. Mijwil
semanticscholar   +1 more source

More than malware: unmasking the hidden risk of cybersecurity regulations

open access: yesInternational Cybersecurity Law Review
Cybersecurity investments are made within a complex and ever-evolving environment, where regulatory changes represent a significant risk factor. While cybersecurity regulations aim to minimize cyber risks and enhance protection, the uncertainty arising ...
Mazaher Kianpour, Shahid Raza
semanticscholar   +1 more source

From Security Frameworks to Sustainable Municipal Cybersecurity Capabilities

open access: yesJournal of Cybersecurity and Privacy
While security frameworks like the NIST CSF and ISO 27001 provide organizations with standardized best practices for cybersecurity, these practices must be implemented in organizations by people with the necessary skills and knowledge and be supported by
Arnstein Vestad, Bian Yang
semanticscholar   +1 more source

PALANTIR: An NFV-Based Security-as-a-Service Approach for Automating Threat Mitigation. [PDF]

open access: yesSensors (Basel), 2023
Compastié M   +8 more
europepmc   +1 more source

User and Professional Aspects for Sustainable Computing Based on the Internet of Things in Europe. [PDF]

open access: yesSensors (Basel), 2023
Pospelova V   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy