411   Artículos

 
en línea
Ikjae Kim, Moosung Park, Hyun-Jin Lee, Jisoo Jang, Soojin Lee and Dongkyoo Shin    
With the advancement of IT technology, intelligent devices such as autonomous vehicles, unmanned equipment, and drones are rapidly evolving. Consequently, the proliferation of defense systems based on these technologies is increasing worldwide. In respon... ver más
Revista: Information    Formato: Electrónico

 
en línea
Samreen Mahmood, Mehmood Chadhar and Selena Firmin    
Purpose: The purpose of this research paper was to analyse the counterstrategies to mitigate cybersecurity challenges using organisational learning loops amidst major crises in the Higher Education and Research Sector (HERS). The authors proposed the lea... ver más
Revista: Information    Formato: Electrónico

 
en línea
Davy Preuveneers and Wouter Joosen    
Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously m... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Emanuele Santonicola, Ennio Andrea Adinolfi, Simone Coppola and Francesco Pascale    
Nowadays, a vehicle can contain from 20 to 100 ECUs, which are responsible for ordering, controlling and monitoring all the components of the vehicle itself. Each of these units can also send and receive information to other units on the network or exter... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Francisco Alonso, Benjamín Samaniego, Gonzalo Farias and Sebastián Dormido-Canto    
This article provides a general overview of the communication protocols used in the IEC61850 standard for the automation of electrical substations. Specifically, it examines the GOOSE and R-GOOSE protocols, which are used for exchanging various types of ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Madhav Mukherjee, Ngoc Thuy Le, Yang-Wai Chow and Willy Susilo    
As the demand for cybersecurity experts in the industry grows, we face a widening shortage of skilled professionals. This pressing concern has spurred extensive research within academia and national bodies, who are striving to bridge this skills gap thro... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ariel López, Mailyn Moreno, Ariadna Moreno, Yahima Hadfeg, Nayma Cepero     Pág. 38 - 54
Revista: Inteligencia Artificial    Formato: Electrónico

 
en línea
Agnieszka Dutkowska-Zuk, Joe Bourne, Chengyuan An, Xuan Gao, Oktay Cetinkaya, Peter Novitzky, Gideon Ogunniye, Rachel Cooper, David De Roure, Julie McCann, Jeremy Watson, Tim Watson and Eleri Jones    
This systematic literature review explores the scholarly debate around public perceptions and behaviors in the context of cybersecurity in connected places. It reveals that, while many articles highlight the importance of public perceptions and behaviors... ver más
Revista: Information    Formato: Electrónico

 
en línea
Razvan Rughini?, Emanuela Bran, Ana Rodica Staiculescu and Alexandru Radovici    
This article examines configurations of digital concerns within the European Union (EU27), a leading hub of innovation and policy development. The core objective is to uncover the social forces shaping technology acceptance and risk awareness, which are ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Abner Perez-Haro and Arturo Diaz-Perez    
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 25     Siguiente »