Multiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning...
Artificial intelligence (AI) and machine learning (ML) are transforming the field of cybersecurity b...
IoT networks are increasingly used as entry points for cyberattacks, as often they offer low-securit...
The number of cybersecurity incidents perpetrated by adversaries using modern complex and emerging t...
Multiple governmental agencies and private organisations have made commitments for the colonisation ...
We explore the potential and practical challenges in the use of artificial intelligence (AI) in cybe...
Digital technologies have changed the way supply chain operations are structured. In this article, w...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
This paper presents an in-depth exploration of the application of Artificial Intelligence (AI), spec...
This article investigates cybersecurity (and risk) in the context of ‘technological singularity’ fro...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
Effective assessment of cyber risks in the increasingly dynamic threat landscape must be supported b...
In the age of digital transformation with adoption of Cloud and mobile computing and ever-increasing...
The increasing connectivity of medical devices along with the growing complexity, heterogeneity and ...
Facing groups of end devices from smart applications in vehicular networks, 5G networks, and Industr...
Artificial Intelligence (AI) is intelligence exhibited by machines. Any system that perceives its en...
Artificial intelligence (AI) and machine learning (ML) are transforming the field of cybersecurity b...
IoT networks are increasingly used as entry points for cyberattacks, as often they offer low-securit...
The number of cybersecurity incidents perpetrated by adversaries using modern complex and emerging t...
Multiple governmental agencies and private organisations have made commitments for the colonisation ...
We explore the potential and practical challenges in the use of artificial intelligence (AI) in cybe...
Digital technologies have changed the way supply chain operations are structured. In this article, w...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
This paper presents an in-depth exploration of the application of Artificial Intelligence (AI), spec...
This article investigates cybersecurity (and risk) in the context of ‘technological singularity’ fro...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
Effective assessment of cyber risks in the increasingly dynamic threat landscape must be supported b...
In the age of digital transformation with adoption of Cloud and mobile computing and ever-increasing...
The increasing connectivity of medical devices along with the growing complexity, heterogeneity and ...
Facing groups of end devices from smart applications in vehicular networks, 5G networks, and Industr...
Artificial Intelligence (AI) is intelligence exhibited by machines. Any system that perceives its en...
Artificial intelligence (AI) and machine learning (ML) are transforming the field of cybersecurity b...
IoT networks are increasingly used as entry points for cyberattacks, as often they offer low-securit...
The number of cybersecurity incidents perpetrated by adversaries using modern complex and emerging t...