[HTML][HTML] Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks
Recent technological advancements in the energy sector, such as the proliferation of electric
vehicles, and smart power electronic devices, have substantially increased the demand for …
vehicles, and smart power electronic devices, have substantially increased the demand for …
Securing industrial control systems: components, cyber threats, and machine learning-driven defense strategies
Industrial Control Systems (ICS), which include Supervisory Control and Data Acquisition
(SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers …
(SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers …
Privacy-centric AI and IoT solutions for smart rural farm monitoring and control
The integration of artificial intelligence (AI) and the Internet of Things (IoT) in agriculture has
significantly transformed rural farming. However, the adoption of these technologies has …
significantly transformed rural farming. However, the adoption of these technologies has …
[HTML][HTML] Electric vehicle charging technologies, infrastructure expansion, grid integration strategies, and their role in promoting sustainable e-mobility
The transport sector is experiencing a notable transition towards sustainability, propelled by
technological progress, innovative materials, and a dedication to environmental …
technological progress, innovative materials, and a dedication to environmental …
The evolution of cyber resilience frameworks in network security: a conceptual analysis
Abstract The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual
Analysis provides a comprehensive overview of the development and application of cyber …
Analysis provides a comprehensive overview of the development and application of cyber …
AI for identity and access management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorization, and access …
This comprehensive study explores the integration and effectiveness of Artificial Intelligence
(AI) in Identity and Access Management (IAM) within cloud environments. It primarily focuses …
(AI) in Identity and Access Management (IAM) within cloud environments. It primarily focuses …
Leveraging machine learning for cybersecurity resilience in industry 4.0: Challenges and future directions
J Yu, AV Shvetsov, SH Alsamhi - IEEE Access, 2024 - ieeexplore.ieee.org
Industry 4.0, where the convergence of digital technology impacts industrial operations and
processes, is characterized by cybersecurity resilience. Therefore, in Industry 4.0, Machine …
processes, is characterized by cybersecurity resilience. Therefore, in Industry 4.0, Machine …
Advancements in Detection and Mitigation: Fortifying Against APTs-A Comprehensive Review
Organizations' cyber security posture is severely challenged by Advanced Persistent Threats
(APTs), necessitating a multifaceted defense strategy. Traditional methods, machine …
(APTs), necessitating a multifaceted defense strategy. Traditional methods, machine …
Cybersecurity's role in environmental protection and sustainable development: Bridging technology and sustainability goals
This study investigates the pivotal role of cybersecurity in bolstering environmental
protection and sustainable development, a critical yet underexplored nexus in contemporary …
protection and sustainable development, a critical yet underexplored nexus in contemporary …
Enhancing Software Supply Chain Resilience: Strategy For Mitigating Software Supply Chain Security Risks And Ensuring Security Continuity In Development …
A Akinsola, A Akinde - arxiv preprint arxiv:2407.13785, 2024 - arxiv.org
This article delves into the strategic approaches and preventive measures necessary to
safeguard the software supply chain against evolving threats. It aims to foster an …
safeguard the software supply chain against evolving threats. It aims to foster an …