Cyber-attacks against the autonomous ship
Autonomous ships transferring valuable cargoes and humans in a more efficient and cost
effective manner will soon be state of the art technology. Yet, their ICT system architecture …
effective manner will soon be state of the art technology. Yet, their ICT system architecture …
How advanced technological approaches are reshaping sustainable social media crisis management and communication: a systematic review
The end goal of technological advancement used in crisis response and recovery is to
prevent, reduce or mitigate the impact of a crisis, thereby enhancing sustainable recovery …
prevent, reduce or mitigate the impact of a crisis, thereby enhancing sustainable recovery …
Cybersecurity risk assessment of a marine dual-fuel engine on inland waterways ship
V Bolbot, L Xiang, P Brunou… - Proceedings of the …, 2024 - journals.sagepub.com
Increased connectivity renders the ships more cost-effective but also vulnerable to
cyberattacks. Since ships are assets of significant value and importance, they constitute a …
cyberattacks. Since ships are assets of significant value and importance, they constitute a …
[PDF][PDF] Temporal Trends Analysis for Dengue Outbreak and Network Threats Severity Prediction Accuracy Improvement.
Time series analysis is one of the major techniques in capturing trends and pattern of the
occurrence for future forecasting. Existing but scarce works have developed temporal-based …
occurrence for future forecasting. Existing but scarce works have developed temporal-based …
[PDF][PDF] A Cloud-based distributed platform for secured Epub Ebook contents
Digital content creators who also own their digitally created content Utilizing Digital Rights
Management or DRM in order to safeguard and govern the distribution and usage of their …
Management or DRM in order to safeguard and govern the distribution and usage of their …
Towards an Enhancement of organizational information security through threat factor profiling (TFP) model
F Sidi, M Daud, S Ahmad, N Zainuddin… - Journal of Physics …, 2017 - iopscience.iop.org
Abstract Information security has been identified by organizations as part of internal
operations that need to be well implemented and protected. This is because each day the …
operations that need to be well implemented and protected. This is because each day the …