Showing 3,341 - 3,357 results of 3,357 for search '"cyber security"', query time: 0.65s Refine Results
  1. 3341
  2. 3342
  3. 3343

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Therefore, we take this initiative to make enhancement in cyber security application to avoid the Internet users from being trapped and deceived by the trick of cyber criminals by developing detec�tion system of malicious spam email and Distributed Denial of Services (DDoS) 377$ 3(53867$.$$1781.8781$0,1$+ iii backscatter. …”
    Get full text
    Thesis
  4. 3344

    Managing Cybersecurity Threats and Increasing Organizational Resilience by Peter R. J. Trim, Yang-Im Lee

    Published 2023-11-01
    “…Cyber security is high up on the agenda of senior managers in private and public sector organizations and is likely to remain so for the foreseeable future. [...]…”
    Get full text
    Article
  5. 3345

    Strategy, Leadership, and AI in the Cyber Ecosystem : The Role of Digital Societies in Information Governance and Decision Making / by Jahankhani, Hamid, editor 241919, O'Dell, Liam M., editor 650997, Bowen, Gordon, editor 650998, Hagan, Daniel, editor 650999, Jamal, Arshad, editor 651001, ScienceDirect (Online service) 7722

    Published 2021
    “…It investigates the interactions from both the firm/organization strategy perspective, including cross-functional actors/stakeholders who are operating within the organization and the various characteristics of operating in a cyber-secure ecosystem.…”
    Get full text
    software, multimedia
  6. 3346

    Mind the FemTech gap: regulation failings and exploitative systems by Maryam Mehrnezhad, Thyla Van Der Merwe, Michael Catt

    Published 2024-03-01
    “…These complex risks and harms are enabled by many factors including inadequate regulations, the non-compliant practices of the industry, and the lack of research and guidelines for cyber-secure, privacy-preserving, and safe products. …”
    Get full text
    Article
  7. 3347

    A look at the time delays in CVSS vulnerability scoring by Jukka Ruohonen

    Published 2019-07-01
    “…Keywords: Software vulnerability, Vulnerability severity, Severity scoring, Database maintenance, Cyber security…”
    Get full text
    Article
  8. 3348

    Security Challenges and Cyber Forensic Ecosystem in IoT Driven BYOD Environment by Md Iman Ali, Sukhkirandeep Kaur, Aditya Khamparia, Deepak Gupta, Sachin Kumar, Ashish Khanna, Fadi Al-Turjman

    Published 2020-01-01
    “…A unique robust scalable model puts forward with significant result from this research and concluded for creating a cyber forensic ecosystem in IoT/BYOD environment to enable cyber secured citizenship in era of HEC with 5G and IoT.…”
    Get full text
    Article
  9. 3349

    Teaching Security in Electronic Transactions through Indonesian Language Materials in High Grade of Elementary School Students by Ferril Irham Muzaki

    Published 2018-08-01
    “…Keywords: electronic transactions, information, network security, cyber security…”
    Get full text
    Article
  10. 3350

    Electric load forecasting under False Data Injection Attacks using deep learning by Arash Moradzadeh, Mostafa Mohammadpourfard, Charalambos Konstantinou, Istemihan Genc, Taesic Kim, Behnam Mohammadi-Ivatloo

    Published 2022-11-01
    “…This paper proposes a cyber-secure deep learning framework that accurately predicts electric load in power grids for a time horizon spanning from an hour to a week. …”
    Get full text
    Article
  11. 3351

    Towards Flexible Distribution Systems: Future Adaptive Management Schemes by Hannu Laaksonen, Hosna Khajeh, Chethan Parthasarathy, Miadreza Shafie-khah, Nikos Hatziargyriou

    Published 2021-04-01
    “…In addition, use of integrated cyber-secure, resilient, cost-efficient, and advanced communication technologies and solutions will be of key importance. …”
    Get full text
    Article
  12. 3352

    A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks by Yahya Lambat, Nick Ayres, Leandros Maglaras, Mohamed Amine Ferrag

    Published 2021-09-01
    “…It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. …”
    Get full text
    Article
  13. 3353

    Digital Banking in Northern India: The Risks on Customer Satisfaction by Baljinder Kaur, Sood Kiran, Simon Grima, Ramona Rupeika-Apoga

    Published 2021-11-01
    “…Offering digital account opening or remote deposits may not satisfy customers; competitive advantage depends on many aspects such as providing a hassle-free, personalized and cyber-secure experience, economic aspects and the needs of the society at large. …”
    Get full text
    Article
  14. 3354

    Cybersecurity in smart local energy systems: requirements, challenges, and standards by Siyuan Dong, Jun Cao, David Flynn, Zhong Fan

    Published 2022-06-01
    “…The research also suggests that the industry needs to produce more affordable and cyber-secured devices and services. For the government and regulators, relevant guidelines on the minimum function and security requirements for applications should be provided. …”
    Get full text
    Article
  15. 3355

    Optimal Scheduling and Management of a Smart City Within the Safe Framework by Qunlong Duan, Nguyen Vu Quynh, Heba M. Abdullah, Abdulaziz Almalaq, Ton Duc Do, Sobhy M. Abdelkader, Mohamed A. Mohamed

    Published 2020-01-01
    “…This paper proposes an enhanced cyber secure energy and data transaction framework for the optimal operation and management of the smart city. …”
    Get full text
    Article
  16. 3356

    Implementation of cybersecure observers and control in microgrids; energy dynamics based approach by Rowles, Premila A.

    Published 2022
    “…The first proof-of-concept simulation is provided to show this cyber-secure combination of energy control and energy observer for microgrids.…”
    Get full text
    Thesis
  17. 3357

    The Critical Raw Materials in Cutting Tools for Machining Applications: A Review by Antonella Rizzo, Saurav Goel, Maria Luisa Grilli, Roberto Iglesias, Lucyna Jaworska, Vjaceslavs Lapkovskis, Pavel Novak, Bogdan O. Postolnyi, Daniele Valerini

    Published 2020-03-01
    “…The focus of this review and its motivation was driven by the four following themes: (i) the discussion of newly emerging hybrid machining processes offering performance enhancements and longevity in terms of tool life (laser and cryogenic incorporation); (ii) the development and synthesis of new CRM substitutes to minimise the use of tungsten; (iii) the improvement of the recycling of worn tools; and (iv) the accelerated use of modelling and simulation to design long-lasting tools in the Industry-4.0 framework, circular economy and cyber secure manufacturing. It may be noted that the scope of this paper is not to represent a completely exhaustive document concerning cutting tools for mechanical processing, but to raise awareness and pave the way for innovative thinking on the use of critical materials in mechanical processing tools with the aim of developing smart, timely control strategies and mitigation measures to suppress the use of CRMs.…”
    Get full text
    Article