|
|
|
Ikjae Kim, Moosung Park, Hyun-Jin Lee, Jisoo Jang, Soojin Lee and Dongkyoo Shin
With the advancement of IT technology, intelligent devices such as autonomous vehicles, unmanned equipment, and drones are rapidly evolving. Consequently, the proliferation of defense systems based on these technologies is increasing worldwide. In respon...
ver más
|
|
|
|
|
|
|
Samreen Mahmood, Mehmood Chadhar and Selena Firmin
Purpose: The purpose of this research paper was to analyse the counterstrategies to mitigate cybersecurity challenges using organisational learning loops amidst major crises in the Higher Education and Research Sector (HERS). The authors proposed the lea...
ver más
|
|
|
|
|
|
|
Davy Preuveneers and Wouter Joosen
Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously m...
ver más
|
|
|
|
|
|
|
Emanuele Santonicola, Ennio Andrea Adinolfi, Simone Coppola and Francesco Pascale
Nowadays, a vehicle can contain from 20 to 100 ECUs, which are responsible for ordering, controlling and monitoring all the components of the vehicle itself. Each of these units can also send and receive information to other units on the network or exter...
ver más
|
|
|
|
|
|
|
Madhav Mukherjee, Ngoc Thuy Le, Yang-Wai Chow and Willy Susilo
As the demand for cybersecurity experts in the industry grows, we face a widening shortage of skilled professionals. This pressing concern has spurred extensive research within academia and national bodies, who are striving to bridge this skills gap thro...
ver más
|
|
|
|
|
|
|
Francisco Alonso, Benjamín Samaniego, Gonzalo Farias and Sebastián Dormido-Canto
This article provides a general overview of the communication protocols used in the IEC61850 standard for the automation of electrical substations. Specifically, it examines the GOOSE and R-GOOSE protocols, which are used for exchanging various types of ...
ver más
|
|
|
|
|
|
|
Ariel López, Mailyn Moreno, Ariadna Moreno, Yahima Hadfeg, Nayma Cepero
Pág. 38 - 54
|
|
|
|
|
|
|
Ayman Khalil and Besma Zeddini
The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users and or...
ver más
|
|
|
|
|
|
|
Woo-Hyun Choi and Jung-Ho Lewe
This study proposes a deep learning model utilizing the BACnet (Building Automation and Control Network) protocol for the real-time detection of mechanical faults and security vulnerabilities in building automation systems. Integrating various machine le...
ver más
|
|
|
|
|
|
|
Maxim Kolomeets, Olga Tushkanova, Vasily Desnitsky, Lidia Vitkova and Andrey Chechulin
This paper aims to test the hypothesis that the quality of social media bot detection systems based on supervised machine learning may not be as accurate as researchers claim, given that bots have become increasingly sophisticated, making it difficult fo...
ver más
|
|
|
|