Found: 5000
Select item for more details and to access through your institution.
THE TECHNOLOGICAL LEVELS OF PRODUCTION AND CONSUMPTION OF BELARUS, RUSSIA, AND KAZAKHSTAN.
- Published in:
- MEST Journal, 2024, v. 12, n. 2, p. 83, doi. 10.12709/mest.12.12.02.11
- By:
- Publication type:
- Article
DIGITAL ECONOMY AND CYBERSECURITY ANALYSIS WITH A FOCUS ON CHINA AND SLOVENIA.
- Published in:
- MEST Journal, 2024, v. 12, n. 2, p. 75, doi. 10.12709/mest.12.12.02.10
- By:
- Publication type:
- Article
SILENT WARFARE: UNDERSTANDING THE IMPACT OF CYBER BLOCKADES AND SANCTIONS.
- Published in:
- MEST Journal, 2024, v. 12, n. 2, p. 49, doi. 10.12709/mest.12.12.02.07
- By:
- Publication type:
- Article
ANALYSIS OF AN ENHANCED RANDOM FOREST ALGORITHM FOR IDENTIFYING ENCRYPTED NETWORK TRAFFIC.
- Published in:
- EUREKA: Physics & Engineering, 2024, n. 5, p. 201, doi. 10.21303/2461-4262.2024.003372
- By:
- Publication type:
- Article
ASSESSMENT OF CYBERSECURITY IN ORGANIZATIONS: AN EMPIRICAL STUDY OF CZECH AND SLOVAK ORGANIZATIONS.
- Published in:
- Journal of Eastern European & Central Asian Research, 2024, v. 11, n. 3, p. 668, doi. 10.15549/jeecar.v11i3.1666
- By:
- Publication type:
- Article
Development of a Cryptographic Model Using Digits Classification for Cyber Security Applications.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 2, p. 287, doi. 10.54216/JCIM.140220
- By:
- Publication type:
- Article
A Hybrid Genetic Algorithm and Neural Network-Based Cyber Security Approach for Enhanced Detection of DDoS and Malware Attacks in Wide Area Networks.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 2, p. 253, doi. 10.54216/JCIM.140217
- By:
- Publication type:
- Article
Cyber Security Protection in Roadside Unit Based on Cross-Layer Adaptive Graph Neural Networks (Gnns) in Vanet.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 179, doi. 10.54216/JCIM.140112
- By:
- Publication type:
- Article
Enhancing Energy Efficiency in Heterogeneous Cyber Security Networks Using Deep Q-Networks Data Routing.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 160, doi. 10.54216/JCIM.140111
- By:
- Publication type:
- Article
Design of Novel Cryptographic Model Using Zero-Knowledge Proof Structure for Cyber Security Applications.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 141, doi. 10.54216/JCIM.140110
- By:
- Publication type:
- Article
Investigating the Efficacy of Deep Reinforcement Learning Models in Detecting and Mitigating Cyber-attacks: a Novel Approach.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 96, doi. 10.54216/JCIM.140107
- By:
- Publication type:
- Article
ML-based Intrusion Detection for Drone IoT Security.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 64, doi. 10.54216/JCIM.140105
- By:
- Publication type:
- Article
Securing the Digital Commerce Spectrum and Cyber Security Strategies for Web, E-commerce, M-commerce, and E-mail Security.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 34, doi. 10.54216/JCIM.140103
- By:
- Publication type:
- Article
The impact of AI-based cyber security on the banking and financial sectors.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 8, doi. 10.54216/JCIM.140101
- By:
- Publication type:
- Article
Fortifying network security: machine learning-powered intrusion detection systems and classifier performance analysis.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 5, p. 5894, doi. 10.11591/ijece.v14i5.pp5894-5905
- By:
- Publication type:
- Article
Emerging Challenges and New Responses, Building Capabilities to Counter Threats in Cyberspace: Questions and Answers on How to Improve Cybersecurity.
- Published in:
- Military Engineer / Hadmérnök, 2024, v. 19, n. 1, p. 121, doi. 10.32567/hm.2024.1.7
- By:
- Publication type:
- Article
Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 191, doi. 10.54216/JCIM.130215
- By:
- Publication type:
- Article
Computational genetic epidemiology: Leveraging HPC for large-scale AI models based on Cyber Security.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 182, doi. 10.54216/JCIM.130214
- By:
- Publication type:
- Article
Optimizing AI-Based Automated Security Patch Deployment in IoT Devices to Combat Zero-Day Exploits and Advanced Cyber Attacks.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 30, doi. 10.54216/JCIM.130203
- By:
- Publication type:
- Article
A safer future: Leveraging the AI power to improve the cybersecurity in critical infrastructures.
- Published in:
- Electrotechnical Review / Elektrotehniski Vestnik, 2024, v. 91, n. 3, p. 73
- By:
- Publication type:
- Article
The impact of the Digital Operational Resilience Act on financial market infrastructures in Europe.
- Published in:
- Journal of Securities Operations & Custody, 2024, v. 16, n. 3, p. 344, doi. 10.69554/khfm3582
- By:
- Publication type:
- Article
The Crucial Role of Red Teaming: Strengthening Indonesia's Cyber Defenses Through Cybersecurity Drill Tests.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 4, p. 1231, doi. 10.18280/ijsse.140420
- By:
- Publication type:
- Article
DRONES AND THEIR APPLICATION IN LOGISTICS.
- Published in:
- Advanced Logistic Systems: Theory & Practice, 2024, v. 18, n. 2, p. 5, doi. 10.32971/als.2024.013
- By:
- Publication type:
- Article
Efficient hashing technique for malicious profile detection at hypervisor environment.
- Published in:
- Computing, 2024, v. 106, n. 10, p. 3175, doi. 10.1007/s00607-024-01325-7
- By:
- Publication type:
- Article
Detecting Online Gambling Promotions on Indonesian Twitter Using Text Mining Algorithm.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 8, p. 942, doi. 10.14569/ijacsa.2024.0150893
- By:
- Publication type:
- Article
Comparative Analysis of Small and Medium-Sized Enterprises Cybersecurity Program Assessment Model.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 8, p. 796, doi. 10.14569/ijacsa.2024.0150878
- By:
- Publication type:
- Article
Research on intent-driven resilience network security.
- Published in:
- Systems Engineering & Electronics, 2024, v. 46, n. 9, p. 3211, doi. 10.12305/j.issn.1001-506X.2024.09.32
- By:
- Publication type:
- Article
Cybersecurity analysis of IoT. A case studies.
- Published in:
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2024, v. 27, n. 1, p. 80, doi. 10.21279/1454-864X-24-I1-011
- By:
- Publication type:
- Article
BVTED: A Specialized Bilingual (Chinese–English) Dataset for Vulnerability Triple Extraction Tasks.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 16, p. 7310, doi. 10.3390/app14167310
- By:
- Publication type:
- Article
Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 16, p. 7104, doi. 10.3390/app14167104
- By:
- Publication type:
- Article
BETWEEN GLOBAL VULNERABILITIES AND REGIONAL REALITIES: CYBERSECURITY DYNAMICS IN EASTERN EUROPE.
- Published in:
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2024, n. 31, p. 76
- By:
- Publication type:
- Article
A Review of Attacker–Defender Games and Cyber Security.
- Published in:
- Games (20734336), 2024, v. 15, n. 4, p. 28, doi. 10.3390/g15040028
- By:
- Publication type:
- Article
A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things.
- Published in:
- Future Internet, 2024, v. 16, n. 8, p. 285, doi. 10.3390/fi16080285
- By:
- Publication type:
- Article
Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 16, p. 5150, doi. 10.3390/s24165150
- By:
- Publication type:
- Article
Advancing Research in the Profession Through the Journal of Contract Management.
- Published in:
- Contract Management, 2024, v. 64, n. 9, p. 4
- By:
- Publication type:
- Article
CYBERSECURITY ANALYTICS: LEVERAGING BUSINESS ANALYTICS IN INDUSTRY 4.0 SETTINGS.
- Published in:
- Scientific Papers of Silesian University of Technology. Organization & Management / Zeszyty Naukowe Politechniki Slaskiej. Seria Organizacji i Zarzadzanie, 2024, n. 198, p. 619, doi. 10.29119/1641-3466.2024.198.35
- By:
- Publication type:
- Article
CYBERSECURITY IN POLISH SECURITY SYSTEM.
- Published in:
- Scientific Papers of Silesian University of Technology. Organization & Management / Zeszyty Naukowe Politechniki Slaskiej. Seria Organizacji i Zarzadzanie, 2024, n. 198, p. 559, doi. 10.29119/1641-3466.2024.198.31
- By:
- Publication type:
- Article
THE USE OF THE COMMAND LINE INTERFACE IN THE VERIFICATION AND MANAGEMENT OF THE SECURITY OF IT SYSTEMS AND THE ANALYSIS OF THE POTENTIAL OF INTEGRATING BIOMETRIC DATA IN CRYPTOGRAPHIC MECHANISMS.
- Published in:
- Scientific Papers of Silesian University of Technology. Organization & Management / Zeszyty Naukowe Politechniki Slaskiej. Seria Organizacji i Zarzadzanie, 2024, n. 198, p. 289, doi. 10.29119/1641-3466.2024.198.16
- By:
- Publication type:
- Article
Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3257, doi. 10.3390/electronics13163257
- By:
- Publication type:
- Article
Domain-Agnostic Representation of Side-Channels.
- Published in:
- Entropy, 2024, v. 26, n. 8, p. 684, doi. 10.3390/e26080684
- By:
- Publication type:
- Article
AAAP Podcast Series, Episode 10: Discussion on Cybersecurity with Norma Krayem.
- Published in:
- American Journal on Addictions, 2024, v. 33, n. 5, p. 595, doi. 10.1111/ajad.13646
- Publication type:
- Article
As Ransomware Attacks on Health Care Surge, Here's What Clinicians and Health Systems Can Do.
- Published in:
- JAMA: Journal of the American Medical Association, 2024, v. 332, n. 8, p. 605, doi. 10.1001/jama.2024.15010
- By:
- Publication type:
- Article
Cyber Modeling: Full of Challenges.
- Published in:
- 2016
- By:
- Publication type:
- Editorial
Assessing Cyberloafing Behaviour among University Students: A Validation of the Cyberloafing Scale.
- Published in:
- Pertanika Journal of Social Sciences & Humanities, 2018, v. 26, n. 1, p. 409
- By:
- Publication type:
- Article
Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games.
- Published in:
- Simulation & Gaming, 2020, v. 51, n. 5, p. 586, doi. 10.1177/1046878120933312
- By:
- Publication type:
- Article
Attitudes about Cybersecurity Articulation Agreements and Transfer Students: A Statewide Survey of Faculty Members and Advisors.
- Published in:
- NACADA Journal, 2022, v. 42, n. 2, p. 32, doi. 10.12930/NACADA-21-30
- By:
- Publication type:
- Article
A biztonságos internethasználat egyes kérdéseiről.
- Published in:
- Tudomanyos es Muszaki Tajekoztatas, 2010, v. 57, n. 11/12, p. 475
- By:
- Publication type:
- Article
Cybersecurity for the Board of Directors of Small and Midsized Businesses.
- Published in:
- Board Leadership, 2018, v. 2018, n. 159, p. 4, doi. 10.1002/bl.30115
- By:
- Publication type:
- Article
News.
- Published in:
- Board Leadership, 2017, v. 2017, n. 149, p. 1, doi. 10.1002/bl.30064
- Publication type:
- Article
Handling New Topics for the Board's Attention.
- Published in:
- Board Leadership, 2014, v. 2014, n. 136, p. 7, doi. 10.1002/bl.30005
- By:
- Publication type:
- Article