103   Artículos

« Anterior     Página: 1 de 6     Siguiente »

 
en línea
Peter R.J. Trim and Yang-Im Lee    
In this paper, insights are provided into how senior managers can establish a global cyber security model that raises cyber security awareness among staff in a partnership arrangement and ensures that cyber attacks are anticipated and dealt with in real ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Ricardo A. Calix, Sumendra B. Singh, Tingyu Chen, Dingkai Zhang and Michael Tu    
The cyber security toolkit, CyberSecTK, is a simple Python library for preprocessing and feature extraction of cyber-security-related data. As the digital universe expands, more and more data need to be processed using automated approaches. In recent yea... ver más
Revista: Information    Formato: Electrónico

 
en línea
Boris Svilicic, Igor Rudan, Alen Jugovic and Damir Zec    
The integrated navigational system (INS) enhances the effectiveness and safety of ship navigation by providing multifunctional display on the basis of integration of at least two navigational functions, the voyage route monitoring with Electronic Chart D... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Iosif Progoulakis, Paul Rohmeyer and Nikitas Nikitakos    
The integration of IT, OT, and human factor elements in maritime assets is critical for their efficient and safe operation and performance. This integration defines cyber physical systems and involves a number of IT and OT components, systems, and functi... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Iosif Progoulakis, Nikitas Nikitakos, Paul Rohmeyer, Barry Bunin, Dimitrios Dalaklis and Stavros Karamperidis    
In an ever-evolving technological industry, the oil and gas sector is already moving forward through the adaptation of Industry 4.0 and the adaptation of advanced cyber technologies through Oil and Gas 4.0. As IT/OT (information technology/operational te... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Stephen A. Ojeka,Egbide Ben-Caleb,Edara-Obong Inyang Ekpe     Pág. 340 - 346
This study appraises the relationship that exists between cyber security and audit committee effectiveness using audit committee independence, audit committee technological expertise and audit committee financial expertise characteristics as independent ... ver más
Revista: International Review of Management and Marketing    Formato: Electrónico

 
en línea
Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey and Kuo-Chu Chang    
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective str... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari    
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac... ver más
Revista: Information    Formato: Electrónico

 
en línea
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information    Formato: Electrónico

 
en línea
Giseok Jeong, Kookjin Kim, Sukjoon Yoon, Dongkyoo Shin and Jiwon Kang    
As the world undergoes rapid digitalization, individuals and objects are becoming more extensively connected through the advancement of Internet networks. This phenomenon has been observed in governmental and military domains as well, accompanied by a ri... ver más
Revista: Information    Formato: Electrónico

 
en línea
Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, Mohammed Adam Taheir and Omprakash Kaiwartya    
The widespread use of technology has made communication technology an indispensable part of daily life. However, the present cloud infrastructure is insufficient to meet the industry?s growing demands, and multi-access edge computing (MEC) has emerged as... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ivan Nedyalkov    
This paper proposes the use of the GNS3 IP network modeling platform to study/verify whether the exchanged information between power electronic devices and a control center (Monitoring and Control Centre) is secure. For the purpose of this work, a power ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Jeremy Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite and Siraj Ahmed Shaikh    
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS) are becoming increasingly complex, but demonstrating the security of CPS is hard and security is frequently compromised. These compromises can lead to safety failure... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, Inayatul Haq, Inam Ullah, Muhammad Iqbal and Habib Hamam    
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the most challenging things to stop. The biggest problem is caused by milli... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Khaled A. Alaghbari, Heng-Siong Lim, Mohamad Hanif Md Saad and Yik Seng Yong    
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper,... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Karthikeyan Saminathan, Sai Tharun Reddy Mulka, Sangeetha Damodharan, Rajagopal Maheswar and Josip Lorincz    
The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason, cyb... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zacharias Anastasakis, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Stavroula Bourou, Konstantinos Psychogyios, Dimitrios Skias and Theodore Zahariadis    
Federated Learning is identified as a reliable technique for distributed training of ML models. Specifically, a set of dispersed nodes may collaborate through a federation in producing a jointly trained ML model without disclosing their data to each othe... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Eric Wai and C. K. M. Lee    
Hardening fog/edge network connections, protecting industrial IoT (IIOT), secure cyber-physical production system (CPPS) implementation.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo    
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Suliman A. Alsuhibany    
The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) technique has been a topic of interest for several years. The ability of computers to recognize CAPTCHA has significantly increased due to the development of deep le... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 6     Siguiente »