scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "cyber security."

1 - 10 of 5,283 results for
 "cyber security."
Results per page:

Cross‐layered distributed data‐driven framework for enhanced smart grid cyber‐physical security

Publication Type: Academic Journal

Source(s): IET Smart Grid, Vol 5, Iss 6, Pp 398-416 (2022)

Abstract: Abstract Smart Grid (SG) research and development has drawn much attention from academia, industry and government due to the great impact it will have on society, economics and the environment. Securing the SG is a considerably significant challenge du...

View details

Exploiting Control Device Vulnerabilities: Attacking Cyber-Physical Water System

Publication Type: Academic Journal

Source(s): Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 32, Iss 1, Pp 270-279 (2022)

Abstract: Industrial Control Systems (ICS) are transitioning from isolated, custom built systems to those employing general purpose computer hosts, wireless networks, and artificial intelligence. An increasing number of vulnerabilities in ICS devices is a major ...

View details

GEORGIAN EXPERIENCE OF DEVELOPING CYBER CAPABILITIES IN THE DEFENCE FIELD

Publication Type: Academic Journal

Source(s): Journal of Defense Resources Management, Vol 13, Iss 2, Pp 25-34 (2022)

Authors:

Abstract: Large-scale attacks from 2008 and 2011 against Georgia further emphasized the necessity of implementing law on information security and founding cyber actors in the country. Announcing cyber security as a challenge of collective defence and recognizing...

View details

Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations

Publication Type: Academic Journal

Source(s): Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-29 (2022)

Abstract: Abstract A datacentre stores information and manages data access in fast and reliable manner. Failure of datacentre operation is not an option and can be catastrophic. Internet of things (IoT) devices in datacentre can automate management tasks and red...

View details

A review on electric vehicle: Technologies, energy trading, and cyber security

Publication Type: Academic Journal

Source(s): Energy Reports, Vol 8, Iss , Pp 9662-9685 (2022)

Abstract: The energy transition is an essential effort from a variety of sectors and levels to achieve a carbon-neutral, larger-renewable integrated civilization. The transportation industry, which is largely concentrated in urban areas, emits more than 20% of t...

View details

On specification-based cyber-attack detection in smart grids

Publication Type: Academic Journal

Source(s): Energy Informatics, Vol 5, Iss S1, Pp 1-21 (2022)

Abstract: Abstract The transformation of power grids into intelligent cyber-physical systems brings numerous benefits, but also significantly increases the surface for cyber-attacks, demanding appropriate countermeasures. However, the development, validation, an...

View details

Uniting cyber security and machine learning: Advantages, challenges and future research

Publication Type: Academic Journal

Source(s): ICT Express, Vol 8, Iss 3, Pp 313-321 (2022)

Abstract: Machine learning (ML) is a subset of Artificial Intelligence (AI), which focuses on the implementation of some systems that can learn from the historical data, identify patterns and make logical decisions with little to no human interventions. Cyber se...

View details

Digital Challenge for the Arab World: Integration or Differentiation Factor?

Publication Type: Academic Journal

Source(s): Vestnik RUDN International Relations, Vol 22, Iss 2, Pp 303-319 (2022)

Abstract: As Arab states integrate into the global digital space, they share its advantages and risks and are included in the construction of the international information security system. Considering the significant influence of the Arab world on the formation ...

View details

THEORETICAL APPROACHES TO PUBLIC-PRIVATE PARTNERSHIPS IN TERMS OF NATIONAL SECURITY

Publication Type: Academic Journal

Source(s): Стратегічна панорама, Iss 1, Pp 42-50 (2022)

Abstract: The article reviews the research on public-private partnerships and singles out their features pertaining to national security. The purpose of this article is to identify problematic issues of theoretical approaches to the formation of public-privat...

View details

The Workplace Information Sensitivity Appraisal (WISA) scale

Publication Type: Academic Journal

Source(s): Computers in Human Behavior Reports, Vol 8, Iss , Pp 100240- (2022)

Abstract: Human error in security plays a significant role in the majority of cyber-attacks on businesses. Security behaviours are impacted by numerous factors, including individual perceptions of information sensitivity. However, there is currently a lack of em...

View details
sponsored