Found: 8
Select item for more details and to access through your institution.
An Improved K-Means Clustering Process Solicitation for Mine Blood Donors Information.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 1, p. 8, doi. 10.54216/JCIM.130101
- By:
- Publication type:
- Article
Securing the Future of Digital Marketing through Advanced Cybersecurity Approaches and Consumer Data Protection Privacy and Regulatory Compliance.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 1, p. 17, doi. 10.54216/JCIM.130102
- By:
- Publication type:
- Article
A Context-Aware Internet of Things (IoT) founded Approach to Scheming an Operative Priority-Based Scheduling Algorithms.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 1, p. 28, doi. 10.54216/JCIM.130103
- By:
- Publication type:
- Article
Pioneering Security: A Hybrid Logic Framework for the Future of IoT Protection.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 1, p. 36, doi. 10.54216/JCIM.130104
- By:
- Publication type:
- Article
Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 1, p. 46, doi. 10.54216/JCIM.130105
- By:
- Publication type:
- Article
Optimizing Intrusion Detection Mechanisms for IoT Network Security.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 1, p. 60, doi. 10.54216/JCIM.130106
- By:
- Publication type:
- Article
A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 1, p. 69, doi. 10.54216/JCIM.130107
- By:
- Publication type:
- Article
Enhancing K-Nearest Neighbors Algorithm in Wireless Sensor Networks through Stochastic Fractal Search and Particle Swarm Optimization.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 1, p. 76, doi. 10.54216/JCIM.130108
- By:
- Publication type:
- Article