12   Artículos

 
en línea
Amthal K. Mousa and Mohammed Najm Abdullah    
The software defined network (SDN) collects network traffic data and proactively manages networks. SDN?s programmability makes it excellent for developing distributed applications, cybersecurity, and decentralized network control in multitenant data cent... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut and Marianne Azer    
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations f... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ahmed A. Abdullah, B. M. El-den, Khaled M. Abo-Al-Ez and Tarek M. Hassan    
Advanced Metering Infrastructure (AMI) plays a crucial role in enabling the efficient functioning of Smart Electrical Grids, but its successful implementation hinges on robust cybersecurity measures. To uphold data confidentiality and integrity, the depl... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mohammad Mustafa Taye    
In recent years, deep learning (DL) has been the most popular computational approach in the field of machine learning (ML), achieving exceptional results on a variety of complex cognitive tasks, matching or even surpassing human performance. Deep learnin... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Mario A. Leiva, Alejandro J. García, Paulo Shakarian and Gerardo I. Simari    
Decision support tools are key components of intelligent sociotechnical systems, and their successful implementation faces a variety of challenges, including the multiplicity of information sources, heterogeneous format, and constant changes. Handling su... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Serhii Yevseiev,Oleksandr Milov,Stanislav Milevskyi,Oleksandr Voitko,Maksym Kasianenko,Yevgen Melenti,Serhii Pohasii,Hrygorii Stepanov,Oleksandr Turinskyi,Serhii Faraon     Pág. 15 - 29
A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of deci... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Konstantinos Demertzis, Panayiotis Kikiras, Nikos Tziritas, Salvador Llopis Sanchez and Lazaros Iliadis    
A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SO... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Melissa Carlton, Yair Levy     Pág. 16 - 28
Cyber threats have been growing with social engineering and business e-mail compromise reported as the two most rising penetration vectors. Advanced Persistent Threats (APTs) are penetration techniques that combine several approaches to gain access to or... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »