IA Jayaraj, B Shanmugam, S Azam… - Journal of Sensor and …, 2022 - mdpi.com
In evolving technology, attacks on medical devices are optimized due to the driving force of AI, computer vision, mixed reality, and the internet of things (IoT). Optimizing cybersecurity …
M Van Haastrecht, G Golpur, G Tzismadia, R Kab… - Electronics, 2021 - mdpi.com
Small-and medium-sized enterprises (SMEs) frequently experience cyberattacks, but often do not have the means to counter these attacks. Therefore, cybersecurity researchers and …
As cybercriminals scale up their operations to increase their profits or inflict greater harm, we argue that there is an equal need to respond to their threats by scaling up cyber-security. To …
Nowadays, ontologies, which are defined under the OWL 2 Web Ontology Language (OWL 2), are being used in several fields like artificial intelligence, knowledge engineering, and …
This study explored the limited use of non-financial banking quantitative risk assessment methodologies. Quantitative assessments have been avoided due to a lack of historical data …
Für eine Klasse von Bedrohungen, die als Advanced Persistent Threats (APTs) bekannt ist, beschreibt diese Arbeit neben der Darstellung des Angriffsablaufs auch Strategien und …