413   Artículos

 
en línea
Ikjae Kim, Moosung Park, Hyun-Jin Lee, Jisoo Jang, Soojin Lee and Dongkyoo Shin    
With the advancement of IT technology, intelligent devices such as autonomous vehicles, unmanned equipment, and drones are rapidly evolving. Consequently, the proliferation of defense systems based on these technologies is increasing worldwide. In respon... ver más
Revista: Information    Formato: Electrónico

 
en línea
Samreen Mahmood, Mehmood Chadhar and Selena Firmin    
Purpose: The purpose of this research paper was to analyse the counterstrategies to mitigate cybersecurity challenges using organisational learning loops amidst major crises in the Higher Education and Research Sector (HERS). The authors proposed the lea... ver más
Revista: Information    Formato: Electrónico

 
en línea
Davy Preuveneers and Wouter Joosen    
Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously m... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ayman Khalil and Besma Zeddini    
The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users and or... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis    
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Woo-Hyun Choi and Jung-Ho Lewe    
This study proposes a deep learning model utilizing the BACnet (Building Automation and Control Network) protocol for the real-time detection of mechanical faults and security vulnerabilities in building automation systems. Integrating various machine le... ver más
Revista: Buildings    Formato: Electrónico

 
en línea
Maxim Kolomeets, Olga Tushkanova, Vasily Desnitsky, Lidia Vitkova and Andrey Chechulin    
This paper aims to test the hypothesis that the quality of social media bot detection systems based on supervised machine learning may not be as accurate as researchers claim, given that bots have become increasingly sophisticated, making it difficult fo... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Emanuele Santonicola, Ennio Andrea Adinolfi, Simone Coppola and Francesco Pascale    
Nowadays, a vehicle can contain from 20 to 100 ECUs, which are responsible for ordering, controlling and monitoring all the components of the vehicle itself. Each of these units can also send and receive information to other units on the network or exter... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Songpu Li, Xinran Yu and Peng Chen    
Model robustness is an important index in medical cybersecurity, and hard-negative samples in electronic medical records can provide more gradient information, which can effectively improve the robustness of a model. However, hard negatives pose difficul... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Audrone Janaviciute, Agnius Liutkevicius, Gedas Dabu?inskas and Nerijus Morkevicius    
Online shopping has become a common and popular form of shopping, so online attackers try to extract money from customers by creating online shops whose purpose is to compel the buyer to disclose credit card details or to pay money for goods that are nev... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 25     Siguiente »