101   Artículos

 
en línea
Woo-Hyun Choi and Jung-Ho Lewe    
This study proposes a deep learning model utilizing the BACnet (Building Automation and Control Network) protocol for the real-time detection of mechanical faults and security vulnerabilities in building automation systems. Integrating various machine le... ver más
Revista: Buildings    Formato: Electrónico

 
en línea
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis    
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Carlos Blanco, Antonio Santos-Olmo and Luis Enrique Sánchez    
As the Internet of Things (IoT) becomes more integral across diverse sectors, including healthcare, energy provision and industrial automation, the exposure to cyber vulnerabilities and potential attacks increases accordingly. Facing these challenges, th... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari    
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Ikjae Kim, Moosung Park, Hyun-Jin Lee, Jisoo Jang, Soojin Lee and Dongkyoo Shin    
With the advancement of IT technology, intelligent devices such as autonomous vehicles, unmanned equipment, and drones are rapidly evolving. Consequently, the proliferation of defense systems based on these technologies is increasing worldwide. In respon... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu    
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of... ver más
Revista: Information    Formato: Electrónico

 
en línea
Adam James Fenton    
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya and Mohammed Ali    
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With recent advancements in automobiles, medical dev... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Afrah Almansoori, Mostafa Al-Emran and Khaled Shaalan    
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ammar Odeh and Anas Abu Taleb    
Cybersecurity finds widespread applications across diverse domains, encompassing intelligent industrial systems, residential environments, personal gadgets, and automobiles. This has spurred groundbreaking advancements while concurrently posing persisten... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 6     Siguiente »