7,979 results on '"cyber security"'
Search Results
2. SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments
3. Deep learning-driven methods for network-based intrusion detection systems: A systematic review
4. Anomaly detection system for ADS-B data: Attack vectors and machine learning models
5. Dynamic risk assessment approach for analysing cyber security events in medical IoT networks
6. Secure Quantum‐based Adder Design for Protecting Machine Learning Systems Against Side‐Channel Attacks
7. Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study
8. LaAeb: A comprehensive log-text analysis based approach for insider threat detection
9. Survey of source code vulnerability analysis based on deep learning
10. Analysis of digital twin and its physical object: exploring the efficiency and accuracy of datasets for real-world application
11. A review on deep anomaly detection in blockchain
12. Cyber-physical attack and the future energy systems: A review
13. Random subspace ensemble-based detection of false data injection attacks in automatic generation control systems
14. Industry 4.0 digital technologies for the advancement of renewable energy: Functions, applications, potential and challenges
15. Balancing Possibilist-probabilistic risk assessment for smart energy hubs: Enabling secure peer-to-peer energy sharing with CCUS technology and cyber-security
16. Towards econometric estimation of the cost of cyber conflict
17. Determinants of the successful Establishment of a Cyber Security Culture in SMEs
18. Whale optimized routing path selection and 128 bit secured key management for maritime safety
19. Genetic Algorithm based feature selection and Naïve Bayes for anomaly detection in fog computing environment
20. Remote Work and Virtual Collaboration: Evaluating the Long-Term Impact on the IT Sector Post-Covid-19
21. A Comprehensive Review of Machine Learning Approaches in IoT and Cyber Security for Information Systems Analysis
22. Global Cybersecurity Governance: The Role of International Norms in Cyberspace
23. Malicious Node Detection in Industrial Internet of Things Using Swarm-Based Optimization Algorithm: A Cyber Security Perspective
24. Research on the Capability Status of Industrial Internet Security Supervision Platform
25. The Effect of Artificial Intelligence on Data Security Systems
26. Künstliche Intelligenz im Future-Skills-Management der Finanzbranche : Welche Rolle künstliche Intelligenz in der Personalentwicklung und im Talent Development bei Unternehmen des Finanzsektors spielt
27. Plotting OSS-Based Supply Chain Attack Strategies and the Defense Failure
28. Detection and Analysis of Cyber-Attacks on IoT Network Devices
29. Analyzing Artificial Intelligence Based Intrusion Detection System in Detecting DDoS Attack
30. Implementation of Deep Learning and Machine Learning for Designing and Analyzing IDS (Intrusion Detection System) Through Novel Framework
31. Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study
32. Are Swedish Passwords Tougher Than the Rest?
33. A Study of AI in Digital Forensics and Forensic Reporting
34. Cyber Security for Smart Transportation System
35. Sharenting: Navigating the Intersection of Parental Sharing and Child Cybersecurity
36. ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection
37. 'Probably Put Some Sort of Fear in': Investigating the Role of Heuristics in Cyber Awareness Messaging for Small to Medium Sized Enterprises
38. Assessing Cyber Security Support for Small and Medium-Sized Enterprises
39. A Profile-Based Cyber Security Readiness Assessment Framework at Country Level
40. Addressing Current and Emerging Challenges in DF: An Examination and Recommendations
41. BehaMiner: System Behavior Mining for Audit Log Based on Graph Learning
42. Hacking Using Social Engineering Detection and Prevention Methods
43. An Ensemble Machine Learning-Based Approach for Detecting Malicious Websites Using URL Features
44. Comparison of Machine Learning Based Anomaly Detection Methods for ADS-B System
45. Quantum-Enhanced Cyber Security Framework for E-Commerce Platforms
46. MEGA-PT: A Meta-game Framework for Agile Penetration Testing
47. Implementation of Recent Advancements in Cyber Security Practices and Laws in India
48. Chapter 5 - Blockchain for security and privacy in the smart sensor network
49. Mobile security awareness of university students in Hong Kong: demographics and education
50. Human factors in remote work: examining cyber hygiene practices
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.