4   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Manojit Chattopadhyay,Rinku Sen,Sumeet Gupta    
Securing a machine from various cyber-attacks has been of serious concern for researchers, statutory bodies such as governments, business organizations and users in both wired and wireless media. However, during the last decade, the amount of data handli... ver más
Revista: Australasian Journal of Information Systems    Formato: Electrónico

 
en línea
Melissa Carlton, Yair Levy     Pág. 16 - 28
Cyber threats have been growing with social engineering and business e-mail compromise reported as the two most rising penetration vectors. Advanced Persistent Threats (APTs) are penetration techniques that combine several approaches to gain access to or... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

 
en línea
Stefano Nativi,Massimo Craglia,Jay Pearlman     Pág. 1 - 15
Global sustainability research requires an integrated multi-disciplinary effort underpinned by a cyber infrastructure able to harness big data and heterogeneous information systems across disciplines. Two approaches are possible to achieve the interopera... ver más

 
en línea
Iosif Progoulakis, Paul Rohmeyer and Nikitas Nikitakos    
The integration of IT, OT, and human factor elements in maritime assets is critical for their efficient and safe operation and performance. This integration defines cyber physical systems and involves a number of IT and OT components, systems, and functi... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »