|
|
|
Emin Aktan, Ivan Bartoli, Branko Gli?ic and Carlo Rainieri
This paper summarizes the lessons learned after several decades of exploring and applying Structural Health Monitoring (SHM) in operating bridge structures. The challenges in real-time imaging and processing of large amounts of sensor data at various ban...
ver más
|
|
|
|
|
|
|
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p...
ver más
|
|
|
|
|
|
|
Manuel Domínguez-Dorado, Francisco J. Rodríguez-Pérez, Javier Carmona-Murillo, David Cortés-Polo and Jesús Calle-Cancho
Public sector organizations are facing an escalating challenge with the increasing volume and complexity of cyberattacks, which disrupt essential public services and jeopardize citizen data and privacy. Effective cybersecurity management has become an ur...
ver más
|
|
|
|
|
|
|
Igor Kotenko, Igor Saenko, Andrey Privalov and Oleg Lauta
The article proposes an approach to ensuring the functioning of Software-Defined Networks (SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the method of topological transformation of stochastic networks. Unlike oth...
ver más
|
|
|
|
|
|
|
An?e Mihelic, Toma? Hovelja and Simon Vrhovec
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ...
ver más
|
|
|
|
|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|
|
|
|
Abubakar Ahmad Musa, Adamu Hussaini, Weixian Liao, Fan Liang and Wei Yu
Cyber-physical systems (CPS) refer to systems that integrate communication, control, and computational elements into physical processes to facilitate the control of physical systems and effective monitoring. The systems are designed to interact with the ...
ver más
|
|
|
|
|
|
|
Cristian Chindrus and Constantin-Florin Caruntu
In today?s dynamic and evolving digital landscape, safeguarding network infrastructure against cyber threats has become a paramount concern for organizations worldwide. This paper presents a novel and practical approach to enhancing cybersecurity readine...
ver más
|
|
|
|
|
|
|
Sasawat Malaivongs, Supaporn Kiattisin and Pattanaporn Chatjuthamard
Cybersecurity risk is among the top risks that every organization must consider and manage, especially during this time wherein technology has become an integral part of our lives; however, there is no efficient and simplified measurement method that org...
ver más
|
|
|
|
|
|
|
Peter R. J. Trim and Yang-Im Lee
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with sociocul...
ver más
|
|
|
|