Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

Information technology and the accountant today: What has really changed?

F Imene, J Imhanzenobe - Journal of Accounting and …, 2020 - academicjournals.org
One of the major advancements in information technology (IT) is the use of IT tools to
perform accounting functions and processes. In this paper, we provide discussions on how …

[PDF][PDF] Advanced persistent threats (apt): An awareness review

HJ Hejase, HF Fayyad-Kazan… - Journal of Economics …, 2020 - researchgate.net
ABSTRACT COVID-19 pandemic has become a major threat to all institutions, irrespective of
its economic role, private and public, by threatening all the functions capitalizing on the …

[PDF][PDF] Cyber security amid COVID-19

HJ Hejase, HF Fayyad-Kazan… - Computer and …, 2021 - pdfs.semanticscholar.org
COVID-19 pandemic obliged thousands of companies pertaining to all economic sectors to
undergo the transformation from on-board work to working from home. Along such rush, the …

[图书][B] Advanced persistent threats in cybersecurity–Cyber warfare

N Sfetcu - 2024 - books.google.com
This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs),
including their characteristics, origins, methods, consequences, and defense strategies, with …

An assessment of cyber attacks preparedness strategy for public and private sectors in Zambia.

KA Mwila - 2020 - dspace.unza.zm
Cyber-attacks are the use of network and computer-based attacks to critical infrastructures
and services that compromises the confidentiality, integrity, and availability to further the …

[PDF][PDF] A Pilot Study to Assess the Success Rate of Email Scams by Phishing: Case in Lebanon

H Fayyad-Kazan, HJ Hejase, CD Darwish… - … Studies in Applied …, 2024 - researchgate.net
Nowadays, almost everyone with internet access has an email address. That has made it
easier for individuals and companies to properly store data, buy and sell products …

[PDF][PDF] Cyber operation planning and operational design

M Karaman, H Catalkaya, AZ Gerehan… - Cyber-Security and …, 2016 - researchgate.net
Improving ICT infrastructure, dramatic increase in internet usage and increasing
dependence on networks have carried with cyber risks and threats. Complex, shape shifting …

[图书][B] Les menaces persistantes avancées en cybersécurité–La guerre cybernétique

N Sfetcu - 2024 - books.google.com
Ce livre vise à fournir une analyse complète des menaces persistantes avancées, y compris
leurs caractéristiques, origines, méthodes, conséquences et stratégies de défense, en …

Analisis Bibliometrika: 4 Dekade Penelitian Cyber Weapon dalam Peperangan Modern

D Hariyadi - Cyber Security dan Forensik Digital - ejournal.uin-suka.ac.id
Dibalik serangan siber terdapat metode baru dalam peperangan modern, yaitu
pemanfaatan cyber weapon. Artikel ini menggunakan analisis bibliometrika untuk …