Works matching DE "CYBERTERRORISM"
Results: 5000
Exploring Machine Learning in Malware Analysis: Current Trends and Future Perspectives.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 1256
- By:
- Publication type:
- Article
Efficient Anomaly Detection Technique for Future IoT Applications.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 1146
- By:
- Publication type:
- Article
Detection of DDoS Cyberattack Using a Hybrid Trust-Based Technique for Smart Home Networks.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 32
- By:
- Publication type:
- Article
The impact of new technologies on the law of state immunity: time for a reassessment of the scope of the territorial tort exception.
- Published in:
- Studies in Law: Research Papers / Studia Prawnicze. Rozprawy i Materialy, 2024, v. 35, n. 2, p. 191, doi. 10.48269/2451-0807-sp-2024-2-08
- By:
- Publication type:
- Article
Creșterea rezilienței cibernetice a IMM prin soluții open-source și colaborare internațională.
- Published in:
- Bulletin of the 'Carol I' National Defence University / Buletinul Universitatii Nationale de Aparare 'Carol I', 2024, v. 13, n. 4, p. 215, doi. 10.53477/2065-8281-24-49
- By:
- Publication type:
- Article
Safety of Systems Integrating Fire Protection Equipment - Risks, Gaps, Recommendations.
- Published in:
- Safety & Fire Technology (2657-8808), 2024, v. 64, n. 2, p. 84, doi. 10.12845/sft.64.2.2024.6
- By:
- Publication type:
- Article
Blockchain-enhanced artificial intelligence for advanced collision avoidance in the Internet of Vehicles (IoV).
- Published in:
- Neural Computing & Applications, 2025, v. 37, n. 6, p. 4915, doi. 10.1007/s00521-024-10842-7
- By:
- Publication type:
- Article
When LLMs meet cybersecurity: a systematic literature review.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-025-00361-w
- By:
- Publication type:
- Article
Artificial Intelligence Accelerated Cyber Operations: A Systematic Literature Review.
- Published in:
- Journal of Information Warfare, 2025, v. 24, n. 1, p. 118
- By:
- Publication type:
- Article
Analyzing Disk-Minimal Malware in Phishing Attacks: A Forensic Methodology for Modern Cyber Threats.
- Published in:
- Journal of Information Warfare, 2025, v. 24, n. 1, p. 82
- By:
- Publication type:
- Article
Enhancing Cybersecurity Measures against URL Phishing in E-Banking: A Machine Learning Approach.
- Published in:
- Journal of Information Warfare, 2025, v. 24, n. 1, p. 49
- By:
- Publication type:
- Article
Vietnam's Securitisation of Cybersecurity Under the Influence of a Rising China.
- Published in:
- Australian Journal of International Affairs, 2025, v. 79, n. 1, p. 169, doi. 10.1080/10357718.2024.2431039
- By:
- Publication type:
- Article
YOU WANT PEACE? GET READY FOR WAR ... IN CYBERSPACE.
- Published in:
- Journal of Modern Science, 2024, v. 60, n. 6, p. 218, doi. 10.13166/jms/197017
- By:
- Publication type:
- Article
Anomaly Detection with Gradient Boosting Regressor on HVAC Systems.
- Published in:
- Journal of Polytechnic, 2024, v. 27, n. 6, p. 2117, doi. 10.2339/politeknik.1379049
- By:
- Publication type:
- Article
Implementation of the ECHO Cyber Skills Framework in the CyberSecPro Project: Enhancing Cybersecurity Capabilities.
- Published in:
- Information & Security, 2024, v. 55, n. 3, p. 236, doi. 10.11610/isij.5517
- By:
- Publication type:
- Article
EFFICIENT CLASSIFIER TO DETECT DDoS ATTACK BASED ON INTERNET OF THINGS.
- Published in:
- Thermal Science, 2024, v. 28, n. 6B, p. 5113, doi. 10.2298/TSCI2406113A
- By:
- Publication type:
- Article
SECURING INNOVATION AT SEA: CYBER RISK MANAGEMENT FOR SMEs IN SHIP DESIGNE.
- Published in:
- Annals of the University Dunarea de Jos of Galati: Fascicle XI, Shipbuilding, 2024, v. 47, p. 89, doi. 10.35219/AnnUgalShipBuilding/2024.47.11
- By:
- Publication type:
- Article
Important Role Of Operating System In Computer Network Connection.
- Published in:
- Dinasti International Journal of Education Management & Social Science, 2024, v. 6, n. 2, p. 1251, doi. 10.38035/dijemss.v6i2.3658
- By:
- Publication type:
- Article
Pengamanan Wilayah Udara: Tanggung Jawab Negara dalam Cyber Espionage di Ruang Angkasa.
- Published in:
- Jurnal Ilmu Hukum, Humaniora dan Politik (JIHHP), 2024, v. 5, n. 2, p. 1112, doi. 10.38035/jihhp.v5i2
- By:
- Publication type:
- Article
Oversampling-Enhanced Feature Fusion-Based Hybrid ViT-1DCNN Model for Ransomware Cyber Attack Detection.
- Published in:
- Computer Modeling in Engineering & Sciences (CMES), 2025, v. 142, n. 2, p. 1667, doi. 10.32604/cmes.2024.056850
- By:
- Publication type:
- Article
Assessing Cyber Intelligence, Learning, and Automation Capabilities.
- Published in:
- Journal of Applied Information Science, 2024, v. 12, n. 2, p. 33
- By:
- Publication type:
- Article
The Copenhagen School's widening security theory in relation to cybersecurity. Applicability and implications.
- Published in:
- Security & Defence Quarterly, 2024, v. 48, n. 4, p. 40, doi. 10.35467/sdq/193049
- By:
- Publication type:
- Article
شناسایی و سطح بندی عوامل دخیل در تنظیم بازار کالاهای اولویت دار مبتنی بر حکمرانی شبکه ای با رویکرد مدل سازی ساختاری تفسیری.
- Published in:
- Journal of Public Administration (JPA), 2024, v. 16, n. 4, p. 899, doi. 10.22059/JIPA.2024.378561.3527
- By:
- Publication type:
- Article
Shared Cybersecurity Responsibilities in the Banking Sector: A Case Study of the Republic of Iraq.
- Published in:
- Journal of College of Education for Pure Science, 2024, v. 14, n. 4, p. 130, doi. 10.32792/jeps.v14i4.420
- By:
- Publication type:
- Article
ANALYSIS OF THE FREQUENCY AND TYPE OF CYBER ATTACKS ON VIBER: STATISTICAL CORRELATION AND TRENDS IN THE LAST THREE YEARS.
- Published in:
- Contemporary Macedonian Defense / Sovremena Makedonska Odbrana, 2024, v. 24, n. 47, p. 1
- By:
- Publication type:
- Article
Von Visionen, Strategien und bibliothekarischer Führungsverantwortung: Das International Library Leaders Programme an der British Library.
- Published in:
- ABI Technik, 2025, v. 45, n. 1, p. 55, doi. 10.1515/abitech-2025-0007
- By:
- Publication type:
- Article
网络威胁技战术情报识别提取生成式技术研究.
- Published in:
- Journal of Frontiers of Computer Science & Technology, 2025, v. 19, n. 1, p. 118, doi. 10.3778/j.issn.1673-9418.2405088
- By:
- Publication type:
- Article
STRATEGII DE APĂRARE CIBERNETICĂ ÎN SECTORUL SĂNĂTĂŢII: DESCURAJARE, REZILIENŢĂ ŞI PROTECŢIA INFRASTRUCTURILOR CRITICE.
- Published in:
- Gândirea Militară Românească, 2024, n. 4, p. 276, doi. 10.55535/GMR.2024.4.17
- By:
- Publication type:
- Article
REPUBLICA POPULARĂ CHINEZĂ ȘI AMENINŢĂRILE LA ADRESA SECURITĂŢII CIBERNETICE A NATO.
- Published in:
- Gândirea Militară Românească, 2024, n. 4, p. 252, doi. 10.55535/GMR.2024.4.16
- By:
- Publication type:
- Article
The Critical Role of Human Resources in Mitigating and Managing Cybersecurity Risks in Modern Organizations: A Strategic Approach.
- Published in:
- Psychosociological Issues in Human Resource Management, 2024, v. 12, n. 2, p. 18
- By:
- Publication type:
- Article
THE GLOBAL TERRORIST THREAT FORECAST IN 2025.
- Published in:
- Revista UNISCI, 2025, n. 67, p. 263, doi. 10.31439/UNISCI-227
- By:
- Publication type:
- Article
SCAMS, CYBERATTACKS SURGE, SURVEY SAYS.
- Published in:
- Quality Progress, 2025, v. 58, n. 1, p. 8
- Publication type:
- Article
Improvement of Lee-Hwang-Yang's Blind Signature Scheme.
- Published in:
- Journal of Systems Science & Information, 2011, v. 9, n. 3, p. 201
- By:
- Publication type:
- Article
A National Survey of Hospital Cyber Attack Emergency Operation Preparedness.
- Published in:
- Prehospital & Disaster Medicine, 2023, v. 38, p. s93, doi. 10.1017/S1049023X23002625
- By:
- Publication type:
- Article
When the Tertiary Care Hospital Becomes Technologically Austere: Communication Lessons Learned from an American Health System Cyberattack.
- Published in:
- Prehospital & Disaster Medicine, 2023, v. 38, p. s39, doi. 10.1017/S1049023X23001395
- By:
- Publication type:
- Article
Virtual Interprofessional Education (VIPE)–The VIPE Program: VIPE Security, a Multi-sectoral Approach to Dealing with Complex Wicked Problems.
- Published in:
- Prehospital & Disaster Medicine, 2023, v. 38, p. s24, doi. 10.1017/S1049023X23001036
- By:
- Publication type:
- Article
Multi-step Operations Strategic Framework for Ransomware Protection.
- Published in:
- SAM Advanced Management Journal (Society for Advancement of Management), 2020, v. 85, n. 4, p. 16
- By:
- Publication type:
- Article
News Briefs.
- Published in:
- 2015
- Publication type:
- Opinion
COMPUTING BEYOND THE FIREWALL.
- Published in:
- Research Technology Management, 2010, v. 53, n. 3, p. 64, doi. 10.1080/08956308.2010.11671472
- By:
- Publication type:
- Article
Security, Archivists, and Digital Collections.
- Published in:
- Journal of Archival Organization, 2018, v. 15, n. 1/2, p. 1, doi. 10.1080/15332748.2019.1609311
- By:
- Publication type:
- Article
A Densely Stacked Attention Method for Cyberattack Detection.
- Published in:
- Journal of Information Science & Engineering, 2023, v. 39, n. 4, p. 935, doi. 10.6688/JISE.202307_39(4).0014
- By:
- Publication type:
- Article
Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 3, p. 943
- By:
- Publication type:
- Article
Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 2, p. 727
- By:
- Publication type:
- Article
Principles of Data Flow Integrity: Specification and Enforcement.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 2, p. 529
- By:
- Publication type:
- Article
LU Decomposition-Based Key Predistribution Scheme for Heterogeneous Wireless Sensor Networks.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 6, p. 1825
- By:
- Publication type:
- Article
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Hash Function.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 6, p. 1789
- By:
- Publication type:
- Article
Effect of Security Investment on Evolutionary Games.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 6, p. 1695
- By:
- Publication type:
- Article
Single Packet ICMP Traceback Technique using Router Interface.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 6, p. 1673
- By:
- Publication type:
- Article
Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 5, p. 1553
- By:
- Publication type:
- Article
The Robustness of "Connecting Characters Together" CAPTCHAs.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 2, p. 347
- By:
- Publication type:
- Article