-
3341
-
3342
Effective fuzz testing via model-guided program synthesis
Published 2023Get full text
Thesis-Doctor of Philosophy -
3343
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Therefore, we take this initiative to make enhancement in cyber security application to avoid the Internet users from being trapped and deceived by the trick of cyber criminals by developing detec�tion system of malicious spam email and Distributed Denial of Services (DDoS) 377$ 3(53867$.$$1781.8781$0,1$+ iii backscatter. …”
Get full text
Thesis -
3344
Managing Cybersecurity Threats and Increasing Organizational Resilience
Published 2023-11-01“…Cyber security is high up on the agenda of senior managers in private and public sector organizations and is likely to remain so for the foreseeable future. [...]…”
Get full text
Article -
3345
Strategy, Leadership, and AI in the Cyber Ecosystem : The Role of Digital Societies in Information Governance and Decision Making /
Published 2021“…It investigates the interactions from both the firm/organization strategy perspective, including cross-functional actors/stakeholders who are operating within the organization and the various characteristics of operating in a cyber-secure ecosystem.…”
Get full text
software, multimedia -
3346
Mind the FemTech gap: regulation failings and exploitative systems
Published 2024-03-01“…These complex risks and harms are enabled by many factors including inadequate regulations, the non-compliant practices of the industry, and the lack of research and guidelines for cyber-secure, privacy-preserving, and safe products. …”
Get full text
Article -
3347
A look at the time delays in CVSS vulnerability scoring
Published 2019-07-01“…Keywords: Software vulnerability, Vulnerability severity, Severity scoring, Database maintenance, Cyber security…”
Get full text
Article -
3348
Security Challenges and Cyber Forensic Ecosystem in IoT Driven BYOD Environment
Published 2020-01-01“…A unique robust scalable model puts forward with significant result from this research and concluded for creating a cyber forensic ecosystem in IoT/BYOD environment to enable cyber secured citizenship in era of HEC with 5G and IoT.…”
Get full text
Article -
3349
Teaching Security in Electronic Transactions through Indonesian Language Materials in High Grade of Elementary School Students
Published 2018-08-01“…Keywords: electronic transactions, information, network security, cyber security…”
Get full text
Article -
3350
Electric load forecasting under False Data Injection Attacks using deep learning
Published 2022-11-01“…This paper proposes a cyber-secure deep learning framework that accurately predicts electric load in power grids for a time horizon spanning from an hour to a week. …”
Get full text
Article -
3351
Towards Flexible Distribution Systems: Future Adaptive Management Schemes
Published 2021-04-01“…In addition, use of integrated cyber-secure, resilient, cost-efficient, and advanced communication technologies and solutions will be of key importance. …”
Get full text
Article -
3352
A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks
Published 2021-09-01“…It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. …”
Get full text
Article -
3353
Digital Banking in Northern India: The Risks on Customer Satisfaction
Published 2021-11-01“…Offering digital account opening or remote deposits may not satisfy customers; competitive advantage depends on many aspects such as providing a hassle-free, personalized and cyber-secure experience, economic aspects and the needs of the society at large. …”
Get full text
Article -
3354
Cybersecurity in smart local energy systems: requirements, challenges, and standards
Published 2022-06-01“…The research also suggests that the industry needs to produce more affordable and cyber-secured devices and services. For the government and regulators, relevant guidelines on the minimum function and security requirements for applications should be provided. …”
Get full text
Article -
3355
Optimal Scheduling and Management of a Smart City Within the Safe Framework
Published 2020-01-01“…This paper proposes an enhanced cyber secure energy and data transaction framework for the optimal operation and management of the smart city. …”
Get full text
Article -
3356
Implementation of cybersecure observers and control in microgrids; energy dynamics based approach
Published 2022“…The first proof-of-concept simulation is provided to show this cyber-secure combination of energy control and energy observer for microgrids.…”
Get full text
Thesis -
3357
The Critical Raw Materials in Cutting Tools for Machining Applications: A Review
Published 2020-03-01“…The focus of this review and its motivation was driven by the four following themes: (i) the discussion of newly emerging hybrid machining processes offering performance enhancements and longevity in terms of tool life (laser and cryogenic incorporation); (ii) the development and synthesis of new CRM substitutes to minimise the use of tungsten; (iii) the improvement of the recycling of worn tools; and (iv) the accelerated use of modelling and simulation to design long-lasting tools in the Industry-4.0 framework, circular economy and cyber secure manufacturing. It may be noted that the scope of this paper is not to represent a completely exhaustive document concerning cutting tools for mechanical processing, but to raise awareness and pave the way for innovative thinking on the use of critical materials in mechanical processing tools with the aim of developing smart, timely control strategies and mitigation measures to suppress the use of CRMs.…”
Get full text
Article