A Survey of Ontologies Considering General Safety, Security, and Operation Aspects in OT

S Hollerer, T Sauter, W Kastner - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
The integration of information technology (IT) and operational technology (OT) is deepening,
amplifying the interconnectedness of operational, safety, and security demands within …

A whole-of-society approach to organise for offensive cyberspace operations: the case of the smart state Sweden

G Huskaj, S Axelsson - European …, 2023 - papers.academic-conferences.org
Threat actors conduct offensive cyberspace operations for many purposes, such as
espionage, to destroy information assets, and cybercrime. These operations are possible …

[HTML][HTML] Ontology-based case study management towards bridging training and actual investigation gaps in digital forensics

HQ Ngo, NA Le-Khac - Forensic Science International: Digital Investigation, 2023 - Elsevier
The training programs in digital forensics have contributed many case study models to guide
digital forensic analyses. However, they only account for a small number of real cases and …

[PDF][PDF] ARTIFICIAL INTELLIGENCE BASED DATA TRACKING METHODS FOR SUPPLY CHAIN PERFORMANCES OPTIMIZATION

VA Matayo, HS Jibrin, MA Isah, AA Aminu - adolescence - researchgate.net
This study explores the integration of artificial intelligence (AI) in data tracking and supply
chain management. It examines the methods, performance, and limitations of these …

Using Semantic-Web Technologies for Situation Assessments of Ethical Hacking High-Value Targets

S Suresh, R Fisher, R Patole, A Zeyher… - … Conference on Cyber …, 2021 - books.google.com
Ethical hacking consists of scanning for targets, evaluating the targets, gaining access,
maintaining access, and clearing tracks. The evaluation of targets represents a complex task …