Ant: a process aware annotation software for regulatory compliance

R Gyory, D Restrepo Amariles, G Lewkowicz… - Artificial Intelligence and …, 2024 - Springer
Accurate data annotation is essential to successfully implementing machine learning (ML)
for regulatory compliance. Annotations allow organizations to train supervised ML …

Safety of the Introduction of Self-driving Vehicles in a Logistics Environment

P Viktor, Á Szeghegyi - Periodica Polytechnica Transportation …, 2022 - pp.bme.hu
Thanks to the increasing speed of technological development brought by the 21 st century,
many of the processes in industrial production have been automated. The next big step in …

[PDF][PDF] Process security methods and measurement in the context of standard management systems.

A Kemendi, P Michelberger - Engineering Management in Production …, 2024 - sciendo.com
The main purpose of the paper is to identify ways to establish process security in the
constantly changing risk and control environment and to introduce a new model. The …

Bibliometric Analysis of Using IT-GRC for Corporate Resilience and Sustainability

I Mahendra, H Prabowo… - 2024 2nd …, 2024 - ieeexplore.ieee.org
GRC and IT-GRC are currently playing an essential role and receiving a lot of attention.
GRC has a role to help companies ensure the attainment of business goals and prevent …

A Survey on Cyber Security Encounters and AGI-Based Solutions

H Arshad, A Sajid, A Akbar, MM Malik… - … General Intelligence (AGI) …, 2024 - Springer
A critical role for cyber security is occasionally seen in the information technology industry.
Data security has emerged as one of the most important competitions. Cybercrimes, which …

Integrált kockázatkezelés

K Ágnes - Biztonságtudományi Szemle, 2022 - biztonsagtudomanyi.szemle.uni …
A vállalatok komplex biztonsági kihívásait a hosszú távú sikeres vállalati működés
érdekében kezelni kell. Az információs és kommunikációs technológiák (IKT) intenzív …

[PDF][PDF] Automated Cybersecurity Risk Assessment for Industrial Control Systems (ACSRA-ICS)

H Altaleb - 2024 - oda.uni-obuda.hu
Contemporary industrial infrastructures and applications rely heavily on Supervisory Control
and Data Acquisition (SCADA) systems to oversee, monitor, and manage operational and …

A biztonság hálózata-a kontrollok biztonsági hálózata

Á Kemendi - Jelenkori Társadalmi és Gazdasági Folyamatok, 2022 - iskolakultura.hu
A hálózatok, valamint a hálózatszerű működés napjaink meghatározó jelenségeivé váltak.
Ezzel párhuzamosan a vállalatok az ipar 4.0, ill. 5.0 korszakában komplex biztonsági …

[PDF][PDF] Enhancing Cybersecurity in Industrial Control Systems through GRC Framework: Principles, Regulations, and Risk Assessment

A Haya, R Zoltan - researchgate.net
Information security's primary purpose is to safeguard confidentiality, integrity, and
availability. Moreover, as a result of the current global expansion, protecting ICS networks …

[PDF][PDF] A BIZTONSÁG HÁLÓZATA–A KONTROLLOK BIZTONSÁGI HÁLÓZATA

K Ágnes - Current Social & Economic Processes/Jelenkori …, 2022 - analecta.hu
Networks, including operations functioning as networks, are today's defining phenomena. In
parallel, industry 4.0 and 5.0 era's companies face complex security challenges requiring …