cyberattack

Explore academic connections and research related to this keyword

104
Views
18
Total Connections

Related Articles & Bibliographies

1
Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
Bhuyan, Soumitra Sudip;Kabir, Umar Y;Escareno, Jessica M;Ector, Kenya;Palakodeti, Sandeep;Wyant, Dav...
2020 Journal of medical systems DOI: 10.1007/s10916-019-1... 370 views
2
The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review.
Argaw, Salem T;Bempong, Nefti-Eboni;Eshaya-Chauvin, Bruce;Flahault, Antoine;
2019 BMC medical informatics and decision making DOI: 10.1186/s12911-018-0... 188 views
3
Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.
Wang, Hao;Lau, Nathan;Gerdes, Ryan M;
2018 Human factors DOI: 10.1177/001872081876... 225 views
4
Blockchains for Secure Digitized Medicine.
Shuaib, Khaled;Saleous, Heba;Shuaib, Karim;Zaki, Nazar;
2019 Journal of personalized medicine DOI: E35 195 views
5
Strategic aspects of cyberattack, attribution, and blame.
Edwards, Benjamin;Furnas, Alexander;Forrest, Stephanie;Axelrod, Robert;
2017 Proceedings of the National Academy of Sciences of... DOI: 10.1073/pnas.1700442... 178 views
6
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection
Kozik, Rafał;Pawlicki, Marek;Choraś, Michał;Pedrycz, Witold;
2019 complexity 239 views
7
ESTRATEGIA COGNITIVA PARA LA EVALUACIÓN DE UNA CENTRAL IP BASADA EN ASTERISK FRENTE A LOS ATAQUES DoS
Alfonso, Guijarro Rodríguez;Lorenzo, Cevallos Torres;Ignacia, Torres Villegas;
2018 opuntia brava 212 views
8
A Dyna-Q-Based Solution for UAV Networks Against Smart Jamming Attacks
Li, Zhiwei;Lu, Yu;Shi, Yun;Wang, Zengguang;Qiao, Wenxin;Liu, Yicen;
2019 Symmetry 97 views
9
Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain
Anum Nawaz;Jorge Peña Queralta;Jixin Guan;Muhammad Awais;Tuan Nguyen Gia;Ali Kashif Bashir;Haibin...
2020 sensors DOI: 10.3390/s20143965 277 views
10
Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things.
Rauf, Abid;Wang, Zhaohong;Sajid, Hasan;Ali Tahir, Muhammad;
2020 Sensors (Basel, Switzerland) DOI: E4221 128 views
11
13
cybercrimes: a proposed taxonomy and challenges
;Harmandeep Singh Brar;Gulshan Kumar
2018 international journal of microbiology DOI: 10.1155/2018/1798659 120 views
14
ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid.
Radoglou Grammatikis, Panagiotis;Sarigiannidis, Panagiotis;Efstathopoulos, Georgios;Panaousis, Emman...
2020 Sensors (Basel, Switzerland) DOI: E5305 179 views
15
Cyberattacks on critical infrastructure: An economic perspective
Piotr, Lis;Jacob, Mendel;
2019 economics and business review 147 views
16
ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid
Grammatikis, Panagiotis Radoglou;Sarigiannidis, Panagiotis;Efstathopoulos, Georgios;Panaousis, Emman...
2020 sensors 134 views
17
resource requirements and speed versus geometry of unconditionally secure physical key exchanges
;Elias Gonzalez;Robert S. Balog;Laszlo B. Kish
2015 European journal of medicinal chemistry DOI: 10.3390/e17042010 103 views

Related Journals

Journal of medical systems
ISSN: 1573-689X 738 views

Related Research Groups

No Research Groups Found

No research groups are currently associated with this keyword.