18   Artículos

 
en línea
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari    
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p... ver más
Revista: Information    Formato: Electrónico

 
en línea
Khaled A. Alaghbari, Heng-Siong Lim, Mohamad Hanif Md Saad and Yik Seng Yong    
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper,... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Aynaz Biniyaz, Behnam Azmoon, Ye Sun and Zhen Liu    
Subsurface drainage has been widely accepted to mitigate the hazard of landslides in areas prone to flooding. Specifically, the use of drainage wells with pumping systems has been recognized as an effective short-term solution to lower the groundwater ta... ver más
Revista: Geosciences    Formato: Electrónico

 
en línea
Eva Maia, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa and Isabel Praça    
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber?physical nature of these infrastructures makes them more vulnerable to cyber?physical threats and m... ver más
Revista: Information    Formato: Electrónico

 
en línea
Stefan Claus and Massimo Stella    
The ability to spot key ideas, trends, and relationships between them in documents is key to financial services, such as banks and insurers. Identifying patterns across vast amounts of domain-specific reports is crucial for devising efficient and targete... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ruobin Qi, Craig Rasband, Jun Zheng and Raul Longoria    
Smart grids integrate advanced information and communication technologies (ICTs) into traditional power grids for more efficient and resilient power delivery and management, but also introduce new security vulnerabilities that can be exploited by adversa... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tianfang Sun, Pin Yang, Mengming Li and Shan Liao    
With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence, han... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Joachim Bjørge Ulven and Gaute Wangen    
The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive Literature Review (CLR) Mo... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hossein Hassani, Stephan Unger and Christina Beneki    
This article investigates the impact of big data on the actuarial sector. The growing fields of applications of data analytics and data mining raise the ability for insurance companies to conduct more accurate policy pricing by incorporating a broader va... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Mounir Hafsa and Farah Jemili    
Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and that a business will fall victim to a cyber-attack every 14 seconds. Notice here that the time frame for such an event is seconds. With petabytes of data ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »