41   Artículos

 
en línea
Emin Aktan, Ivan Bartoli, Branko Gli?ic and Carlo Rainieri    
This paper summarizes the lessons learned after several decades of exploring and applying Structural Health Monitoring (SHM) in operating bridge structures. The challenges in real-time imaging and processing of large amounts of sensor data at various ban... ver más
Revista: Infrastructures    Formato: Electrónico

 
en línea
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari    
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p... ver más
Revista: Information    Formato: Electrónico

 
en línea
Manuel Domínguez-Dorado, Francisco J. Rodríguez-Pérez, Javier Carmona-Murillo, David Cortés-Polo and Jesús Calle-Cancho    
Public sector organizations are facing an escalating challenge with the increasing volume and complexity of cyberattacks, which disrupt essential public services and jeopardize citizen data and privacy. Effective cybersecurity management has become an ur... ver más
Revista: Information    Formato: Electrónico

 
en línea
Igor Kotenko, Igor Saenko, Andrey Privalov and Oleg Lauta    
The article proposes an approach to ensuring the functioning of Software-Defined Networks (SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the method of topological transformation of stochastic networks. Unlike oth... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
An?e Mihelic, Toma? Hovelja and Simon Vrhovec    
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Valeria Mercuri, Martina Saletta and Claudio Ferretti    
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Abubakar Ahmad Musa, Adamu Hussaini, Weixian Liao, Fan Liang and Wei Yu    
Cyber-physical systems (CPS) refer to systems that integrate communication, control, and computational elements into physical processes to facilitate the control of physical systems and effective monitoring. The systems are designed to interact with the ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Cristian Chindrus and Constantin-Florin Caruntu    
In today?s dynamic and evolving digital landscape, safeguarding network infrastructure against cyber threats has become a paramount concern for organizations worldwide. This paper presents a novel and practical approach to enhancing cybersecurity readine... ver más
Revista: Information    Formato: Electrónico

 
en línea
Sasawat Malaivongs, Supaporn Kiattisin and Pattanaporn Chatjuthamard    
Cybersecurity risk is among the top risks that every organization must consider and manage, especially during this time wherein technology has become an integral part of our lives; however, there is no efficient and simplified measurement method that org... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Peter R. J. Trim and Yang-Im Lee    
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with sociocul... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »