KF Cheung, MGH Bell, J Bhattacharjya - Transportation Research Part E …, 2021 - Elsevier
Technological applications have increasingly improved the quality of services in the logistics industry. However, the adoption of internet-based technologies has increased the attack …
This paper provides a survey of prediction, and forecasting methods used in cyber security. Four main tasks are discussed first, attack projection and intention recognition, in which …
Ships and maritime infrastructure are becoming increasingly interconnected as the maritime industry is undergoing the industry 4.0 revolution. This development is associated with novel …
Threats are potential events, intentional or not, that compromise the confidentiality, integrity, and/or availability of information systems. Defending against threats and attacks requires …
AA Khan, J Abonyi - Cleaner Logistics and Supply Chain, 2022 - Elsevier
In order to realize the goals of Industry 5.0 (I5. 0), which has data interoperability as one of its core principles, the future research in the Supply Chain (SC) visibility has to be aligned …
The cyberspace depicts an increasing number of difficulties related to security, especially in healthcare. This is evident from how vulnerable critical infrastructures are to cyberattacks …
Y Fang, Y Liu, C Huang, L Liu - Plos one, 2020 - journals.plos.org
In recent years, the number of vulnerabilities discovered and publicly disclosed has shown a sharp upward trend. However, the value of exploitation of vulnerabilities varies for attackers …
Abstract Hidden Markov Models have been extensively used for determining computer systems under a Multi-Stage Network Attack (MSA), however, acquisition of optimal model …
This paper discusses the valuable role recommender systems may play in cybersecurity. First, a comprehensive presentation of recommender system types is presented, as well as …