A Survey of Ontologies Considering General Safety, Security, and Operation Aspects in OT
The integration of information technology (IT) and operational technology (OT) is deepening,
amplifying the interconnectedness of operational, safety, and security demands within …
amplifying the interconnectedness of operational, safety, and security demands within …
A whole-of-society approach to organise for offensive cyberspace operations: the case of the smart state Sweden
G Huskaj, S Axelsson - European …, 2023 - papers.academic-conferences.org
Threat actors conduct offensive cyberspace operations for many purposes, such as
espionage, to destroy information assets, and cybercrime. These operations are possible …
espionage, to destroy information assets, and cybercrime. These operations are possible …
[HTML][HTML] Ontology-based case study management towards bridging training and actual investigation gaps in digital forensics
HQ Ngo, NA Le-Khac - Forensic Science International: Digital Investigation, 2023 - Elsevier
The training programs in digital forensics have contributed many case study models to guide
digital forensic analyses. However, they only account for a small number of real cases and …
digital forensic analyses. However, they only account for a small number of real cases and …
[PDF][PDF] ARTIFICIAL INTELLIGENCE BASED DATA TRACKING METHODS FOR SUPPLY CHAIN PERFORMANCES OPTIMIZATION
VA Matayo, HS Jibrin, MA Isah, AA Aminu - adolescence - researchgate.net
This study explores the integration of artificial intelligence (AI) in data tracking and supply
chain management. It examines the methods, performance, and limitations of these …
chain management. It examines the methods, performance, and limitations of these …
Using Semantic-Web Technologies for Situation Assessments of Ethical Hacking High-Value Targets
S Suresh, R Fisher, R Patole, A Zeyher… - … Conference on Cyber …, 2021 - books.google.com
Ethical hacking consists of scanning for targets, evaluating the targets, gaining access,
maintaining access, and clearing tracks. The evaluation of targets represents a complex task …
maintaining access, and clearing tracks. The evaluation of targets represents a complex task …