Works matching DE "CYBERTERRORISM"
Results: 5000
AI-Driven Transformer Frameworks for Real-Time Anomaly Detection in Network Systems.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 2, p. 1121
- By:
- Publication type:
- Article
Enhanced Cyber Threat Detection System Leveraging Machine Learning Using Data Augmentation.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 2, p. 218
- By:
- Publication type:
- Article
Operating Principles From the Digital Battle Space That Could Benefit the Digital Care Space.
- Published in:
- Military Medicine, 2025, v. 190, n. 3/4, p. 77, doi. 10.1093/milmed/usae140
- By:
- Publication type:
- Article
Authentication Methods in Internet-of-Things Platform: A Comprehensive Review.
- Published in:
- Majlesi Journal of Telecommunication Devices, 2024, v. 13, n. 4, p. 239, doi. 10.71822/mjtd.2024.1123260
- By:
- Publication type:
- Article
Containerization Approach for Secure Internet of Medical Things (IoMT) Communication Protocols.
- Published in:
- INFOCOMP: Journal of Computer Science, 2024, v. 23, n. 2, p. 1
- By:
- Publication type:
- Article
Ensemble Learning Approaches for Enhanced Internet of Things Cyberattacks Detection: a Comparative Study.
- Published in:
- International Review of Aerospace Engineering, 2024, v. 17, n. 4, p. 115, doi. 10.15866/irease.v17i4.25257
- By:
- Publication type:
- Article
ПЕРЕХІД ДО ПОСТКВАНТОВИХ КРИПТОГРАФІЧНИХ СИСТЕМ: ВИКЛИКИ, СТАНДАРТИЗАЦІЯ ТА ПЕРСПЕКТИВИ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 2, p. 303, doi. 10.18372/2225-5036.30.19243
- By:
- Publication type:
- Article
ВПЛИВ НЕЙРОННИХ МЕРЕЖ НА РОЗВИТОК КІБЕРБЕЗПЕКИ В УМОВАХ РЕГУЛЯТОРНИХ ЗМІН.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 2, p. 261, doi. 10.18372/2225-5036.30.19238
- By:
- Publication type:
- Article
ФОРМАЛІЗОВАНА ПОСТАНОВКА НАУКОВОГО ЗАВДАННЯ З РОЗРОБЛЕННЯ СИМЕТРИЧНОЇ КРИПТОГРАФІЧНОЇ СИСТЕМИ ЗАХИСТУ МОВНОЇ ІНФОРМАЦІЇ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 2, p. 297, doi. 10.18372/2225-5036.30.19242
- By:
- Publication type:
- Article
Diagnostic behavior analysis of profuse data intrusions in cyber physical systems using adversarial learning techniques.
- Published in:
- Scientific Reports, 2025, v. 15, n. 1, p. 1, doi. 10.1038/s41598-025-91856-6
- By:
- Publication type:
- Article
FOSDET: A NEW HYBRID MACHINE LEARNING MODEL FOR ACCURATE AND FAST DETECTION OF IOT BOTNET.
- Published in:
- Scientific Bulletin of National Mining University, 2025, n. 1, p. 104, doi. 10.33271/nvngu/2025-1/104
- By:
- Publication type:
- Article
A dataset for cyber threat intelligence modeling of connected autonomous vehicles.
- Published in:
- Scientific Data, 2025, v. 12, n. 1, p. 1, doi. 10.1038/s41597-025-04439-5
- By:
- Publication type:
- Article
Understanding the Role of Demographic and Psychological Factors in Users' Susceptibility to Phishing Emails: A Review.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 2236, doi. 10.3390/app15042236
- By:
- Publication type:
- Article
PE-DOCC: A Novel Periodicity-Enhanced Deep One-Class Classification Framework for Electricity Theft Detection.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 2193, doi. 10.3390/app15042193
- By:
- Publication type:
- Article
Unmasking the True Identity: Unveiling the Secrets of Virtual Private Networks and Proxies.
- Published in:
- Information (2078-2489), 2025, v. 16, n. 2, p. 126, doi. 10.3390/info16020126
- By:
- Publication type:
- Article
Unveiling XSS Threats: A Bipartite Graph Approach with Ensemble Deep Learning for Enhanced Detection.
- Published in:
- Information (2078-2489), 2025, v. 16, n. 2, p. 97, doi. 10.3390/info16020097
- By:
- Publication type:
- Article
Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 88, doi. 10.3390/fi17020088
- By:
- Publication type:
- Article
Security and Privacy in Physical–Digital Environments: Trends and Opportunities.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 83, doi. 10.3390/fi17020083
- By:
- Publication type:
- Article
Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT).
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 3619, doi. 10.32604/cmc.2024.054802
- By:
- Publication type:
- Article
State-sponsored cyber attacks and co-movements in stock market returns: evidence from US cybersecurity defense contractors.
- Published in:
- Business & Politics, 2025, v. 27, n. 1, p. 95, doi. 10.1017/bap.2024.22
- By:
- Publication type:
- Article
Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries.
- Published in:
- Mathematics (2227-7390), 2025, v. 13, n. 4, p. 655, doi. 10.3390/math13040655
- By:
- Publication type:
- Article
Cost-Efficient Hybrid Filter-Based Parameter Selection Scheme for Intrusion Detection System in IoT.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 726, doi. 10.3390/electronics14040726
- By:
- Publication type:
- Article
A Generalized Framework for Adversarial Attack Detection and Prevention Using Grad-CAM and Clustering Techniques.
- Published in:
- Systems, 2025, v. 13, n. 2, p. 88, doi. 10.3390/systems13020088
- By:
- Publication type:
- Article
Advancing Cyber Incident Timeline Analysis Through Retrieval-Augmented Generation and Large Language Models.
- Published in:
- Computers (2073-431X), 2025, v. 14, n. 2, p. 67, doi. 10.3390/computers14020067
- By:
- Publication type:
- Article
Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks.
- Published in:
- Computers (2073-431X), 2025, v. 14, n. 2, p. 58, doi. 10.3390/computers14020058
- By:
- Publication type:
- Article
Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector.
- Published in:
- Computers (2073-431X), 2025, v. 14, n. 2, p. 49, doi. 10.3390/computers14020049
- By:
- Publication type:
- Article
From Vulnerability to Defense: The Role of Large Language Models in Enhancing Cybersecurity.
- Published in:
- Computation, 2025, v. 13, n. 2, p. 30, doi. 10.3390/computation13020030
- By:
- Publication type:
- Article
An Effective Deep Learning-Based Intrusion Detection System for the Healthcare Environment.
- Published in:
- International Journal of Computational Intelligence & Applications, 2025, v. 24, n. 1, p. 1, doi. 10.1142/S1469026824500330
- By:
- Publication type:
- Article
Enhancing resilience of distributed DC microgrids against cyber attacks using a transformer-based Kalman filter estimator.
- Published in:
- Scientific Reports, 2025, v. 15, n. 1, p. 1, doi. 10.1038/s41598-025-90959-4
- By:
- Publication type:
- Article
Hybrid BiLSTM-SVM Intrusion Detection with Decision-Based Flow Ranking.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 67, doi. 10.18280/ijsse.150107
- By:
- Publication type:
- Article
A Comparative Study of Incremental and Batch Machine Learning Methodologies for Network Intrusion Detection.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 171, doi. 10.18280/ijsse.150118
- By:
- Publication type:
- Article
A Blockchain-Based Malware Detection Model for IoT Devices.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 13, doi. 10.18280/ijsse.150102
- By:
- Publication type:
- Article
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications †.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 1194, doi. 10.3390/s25041194
- By:
- Publication type:
- Article
The Cyber Proxy War: Non-State Actors Role in Global Geopolitical Competition.
- Published in:
- Journal Research of Social Science, Economics & Management, 2025, v. 4, n. 6, p. 815, doi. 10.59141/jrssem.v4i6.773
- By:
- Publication type:
- Article
Gentlemen, you can't fight in here. Or can you?: How cyberspace operations impact international security.
- Published in:
- World Affairs, 2024, v. 187, n. 1, p. 24, doi. 10.1002/waf2.12004
- By:
- Publication type:
- Article
Shadow Wars.
- Published in:
- World Affairs, 2010, v. 173, n. 4, p. 33
- By:
- Publication type:
- Article
Revealing Secrets: An Unofficial History of Australian Signals Intelligence and the Advent of Cyber: By John Blaxland and Clare Birgin. Sydney: UNSW Press, 2023. Pp. 451. A$49.99 paper.
- Published in:
- Australian Historical Studies, 2024, v. 55, n. 2, p. 409, doi. 10.1080/1031461X.2024.2330120
- By:
- Publication type:
- Article
"Our Biggest Nightmare Is Here": Cyberattacks are targeting school districts. How can schools respond to keep data and systems secure?
- Published in:
- Education Next, 2022, v. 22, n. 2, p. 44
- By:
- Publication type:
- Article
A Call for Support from The Mystetski Arsenal National Art and Culture Museum Complex in Kyiv.
- Published in:
- Curator, 2022, v. 65, p. 1, doi. 10.1111/cura.12484
- Publication type:
- Article
CYBER OPERATIONS AND THE JUS AD BELLUM REVISITED.
- Published in:
- Villanova Law Review, 2011, v. 56, n. 3, p. 569
- By:
- Publication type:
- Article
Understanding Cyber Risk: Unpacking and Responding to Cyber Threats Facing the Public and Private Sectors.
- Published in:
- University of Miami Law Review, 2024, v. 78, n. 3, p. 840
- By:
- Publication type:
- Article
Evolving Toward a Balanced Cyber Strategy in East Asia: Cyber Deterrence or Cooperation?
- Published in:
- Issues & Studies, 2020, v. 56, n. 03, p. N.PAG, doi. 10.1142/S1013251120400111
- By:
- Publication type:
- Article
Responsive Regulation and the Reporting of Information Security Incidents--Taiwan and China.
- Published in:
- Issues & Studies, 2012, v. 48, n. 1, p. 85
- By:
- Publication type:
- Article
Understanding and Preventing Suicide Terrorism.
- Published in:
- Peace Review, 2021, v. 33, n. 4, p. 427, doi. 10.1080/10402659.2021.2042993
- By:
- Publication type:
- Article
Using Peace Research to Assess Cyberthreats.
- Published in:
- Peace Review, 2005, v. 17, n. 2/3, p. 239, doi. 10.1080/14631370500332973
- By:
- Publication type:
- Article
Synthesizing verified components for cyber assured systems engineering.
- Published in:
- Software & Systems Modeling, 2023, v. 22, n. 5, p. 1451, doi. 10.1007/s10270-023-01096-3
- By:
- Publication type:
- Article
Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix.
- Published in:
- Software & Systems Modeling, 2022, v. 21, n. 1, p. 157, doi. 10.1007/s10270-021-00898-7
- By:
- Publication type:
- Article
Stopping Cyberattacks: Strategies for Dental Office Data Security.
- Published in:
- Compendium of Continuing Education in Dentistry (15488578), 2021, v. 42, n. 1, p. 11
- By:
- Publication type:
- Article
Experiences and Lessons Learned at an Small and Medium-Sized Enterprise (SME) Following Two Ransomware Attacks.
- Published in:
- MIS Quarterly Executive, 2024, v. 23, n. 4, p. 429, doi. 10.17705/2msqe.00106
- By:
- Publication type:
- Article
Challenges and Best Practices in Information Security Management.
- Published in:
- MIS Quarterly Executive, 2018, v. 17, n. 3, p. 237
- By:
- Publication type:
- Article