Search
Now showing items 501-510 of 2136
Cyber warfare : the game changer in the battlespace
(Cyberwatch Finland Oy, 2022)
A recent development in warfare has been the integration of Electronic Warfare (EW), Information Warfare (IW) and Cyber Warfare (CW) systems designed to generate non-kinetic effects in battle space together with the ...
Cyber-Attacks Against Critical Infrastructure
(Springer, 2022)
In the cyber world, the most important threat focuses on critical infrastructure (CI). CI encompasses the structures and functions that are vital to society’s uninterrupted functioning. It comprises physical facilities and ...
Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures
(Springer, 2022)
Critical infrastructure (CI) is a vital asset for the economy and society’s functioning, covering sectors such as energy, finance, healthcare, transport, and water supply. Governments around the world invest a lot of effort ...
Cybersecurity attacks on software logic and error handling within ADS-B implementations : systematic testing of resilience and countermeasures
(Institute of Electrical and Electronics Engineers (IEEE), 2022)
Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in ...
Cybersecurity Attacks on Software Logic and Error Handling within AIS Implementations : A Systematic Testing of Resilience
(Institute of Electrical and Electronics Engineers (IEEE), 2022)
To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System ...
Cybersecurity risk assessment subjects in information flows
(Academic Conferences International Ltd, 2022)
A modern society includes several critical infrastructures in which digitalization can have positive impacts on the levels of autonomy and efficiency in the use of infrastructure systems. Maritime transportation is an ...
Cyberspace from the Hybrid Threat Perspective
(Peregrine Technical Solutions, LLC, 2013)
Hybrid threats use conventional and unconventional means to achieve their goals. This paper explores the cyber threats as one possible aspect of hybrid threats. It describes three ways of approaching ...
D3 Dihedral Logistic Map of Fractional Order
(MDPI AG, 2022)
In this paper, the D3 dihedral logistic map of fractional order is introduced. The map presents a dihedral symmetry D3. It is numerically shown that the construction and interpretation of the bifurcation diagram versus the ...
Dangers of Demosaicing : Confusion From Correlation
(IEEE, 2019)
Images from colour sensors using Bayer filter arrays require demosaicing before viewing or further analysis. Advanced demosaicing methods use empirical knowledge of
inter-channel correlations to reduce interpolation ...
Data Analytics in Healthcare : A Tertiary Study
(Springer Science and Business Media LLC, 2023)
The field of healthcare has seen a rapid increase in the applications of data analytics during the last decades. By utilizing different data analytic solutions, healthcare areas such as medical image analysis, disease ...