Cyber-attacks against the autonomous ship

G Kavallieratos, S Katsikas, V Gkioulos - Computer Security: ESORICS …, 2019 - Springer
Autonomous ships transferring valuable cargoes and humans in a more efficient and cost
effective manner will soon be state of the art technology. Yet, their ICT system architecture …

How advanced technological approaches are reshaping sustainable social media crisis management and communication: a systematic review

UA Bukar, F Sidi, MA Jabar, RNH Nor, S Abdullah… - Sustainability, 2022 - mdpi.com
The end goal of technological advancement used in crisis response and recovery is to
prevent, reduce or mitigate the impact of a crisis, thereby enhancing sustainable recovery …

Cybersecurity risk assessment of a marine dual-fuel engine on inland waterways ship

V Bolbot, L Xiang, P Brunou… - Proceedings of the …, 2024 - journals.sagepub.com
Increased connectivity renders the ships more cost-effective but also vulnerable to
cyberattacks. Since ships are assets of significant value and importance, they constitute a …

[PDF][PDF] Temporal Trends Analysis for Dengue Outbreak and Network Threats Severity Prediction Accuracy Improvement.

NM Sharef, NA Husin, KA Kasmiran, MIH Ninggal - J. Digit. Inf. Manag., 2019 - dline.info
Time series analysis is one of the major techniques in capturing trends and pattern of the
occurrence for future forecasting. Existing but scarce works have developed temporal-based …

[PDF][PDF] A Cloud-based distributed platform for secured Epub Ebook contents

YP Faniband, I Ishak, F Sidi… - International Journal of …, 2020 - researchgate.net
Digital content creators who also own their digitally created content Utilizing Digital Rights
Management or DRM in order to safeguard and govern the distribution and usage of their …

Towards an Enhancement of organizational information security through threat factor profiling (TFP) model

F Sidi, M Daud, S Ahmad, N Zainuddin… - Journal of Physics …, 2017 - iopscience.iop.org
Abstract Information security has been identified by organizations as part of internal
operations that need to be well implemented and protected. This is because each day the …

[引用][C] The Use of Repeatable Components in Hybrid Models to Enhance Software Project Management Success

MA Jabar - Turkish Journal of Computer and Mathematics …, 2021