114 results on '"Cyberterrorism -- Analysis"'
Search Results
2. Toma de decisiones en la gestión de riesgos cibernéticos: una aproximación fenomenológico-hermenéutica
3. Chinese School Boys and Social Media: A Study of Cyberattacks
4. Cybersecurity GenAI features: Are they worth the money?
5. Research Results from University of California San Diego (UCSD) Update Knowledge of Heart Attack (Ransomware Cyberattack Associated With Cardiac Arrest Incidence and Outcomes at Untargeted, Adjacent Hospitals)
6. FLASH: NO EVIDENCE SUPPORTS IRRATIONAL CLAIM OF SO-CALLED 'CYBERATTACKS FROM CHINA,' XI TELLS BIDEN
7. CENTER FOR VOTING TECHNOLOGY CONDUCTS COMPREHENSIVE ASSESSMENT OF NEW CONNECTICUT VOTING MACHINES
8. CRIMES CIBERNÃTICOS, PRIVACIDADE E CIBERSEGURANÃA/Cybercrimes, privacy and cybersecurity
9. Study Findings from Shri Mata Vaishno Devi University Update Knowledge in Cybersecurity (Mapping of organizational deviance research during the last two decades: a bibliometric approach)
10. Research from Zhejiang University of Technology in the Area of Cybersecurity Described (MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs)
11. Progress AI-Powered Flowmon Introduces Up to 10x Search Acceleration for Faster Cyberthreat Hunting and Network Troubleshooting
12. Sungkyunkwan University Researchers Update Current Data on Cybersecurity (Optimum noise mechanism for differentially private queries in discrete finite sets)
13. CarbonHelix and Intezer Announce Strategic Partnership to Enhance Cybersecurity with AI-Driven SecOps and a 24x7 Human SOC Team
14. The Guardia Civil arrests two people for more than 100 cyberattacks on government agencies and private entities
15. Cyberattack on IECM website? Website crashes in the middle of CDMX 2024 election day
16. SHARED NETWORK | The cyberattack on the IECM
17. Analysis links Russia to cyberattacks - cyber security office head
18. Analysis links Russia to cyberattacks - cyber security office head
19. 2023 Was the Worst Year Ever for Online Cyber Attacks
20. Formación y concienciación en ciberseguridad basada en competencias: una revisión sistemática de literatura/Competency-based cybersecurity training and awareness: a systematic literature review
21. Recent Findings in Information Technology Described by Researchers from Hong Kong Polytechnic University (Data-driven Vulnerability Analysis of Shared Electric Vehicle Systems To Cyberattacks)
22. Universidad Internacional Researcher Reports on Findings in Electronics (Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada)
23. University of Le Havre Researcher Targets Cybersecurity and Privacy (An Approach for Anomaly Detection in Network Communications Using k-Path Analysis)
24. New Findings Reported from Kongu Engineering College Describe Advances in Terrorism (Cybersecurity and Cyber-terrorism Challenges To Energy-related Infrastructures - Cybersecurity Frameworks and Economics - Comprehensive Review)
25. Austria : Computer Emergency Teams
26. New Data from Southeast University Illuminate Research in Cybersecurity (HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy)
27. National Rural Electric Cooperative Association, American Electric Reliability Corporation to collaborate on cybersecurity
28. NRECA SIGNS MOU WITH ELECTRICITY INFORMATION SHARING AND ANALYSIS CENTER TO BOLSTER CYBERSECURITY COLLABORATION
29. Studies from Institute of Information Engineering in the Area of Cybersecurity Described (Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy)
30. MITRE Releases EMB3D[TM] - A Cybersecurity Threat Model for Embedded Devices
31. Cloud Security Alliance Announces Additional Mappings Between Cloud Controls Matrix (CCM) and National Institute of Standards and Technology's (NIST) Cybersecurity Framework (CFT)
32. The hawks and doves of cybersecurity
33. Interior Minister reviews cyber security, other measures at NADRA
34. ICS attack classifications: The geopolitical impact of misclassification
35. Enterprise Cybersecurity: Pivoting From Traditional Measures To Innovative Strategies
36. AI increases cybersecurity challenges manifold for financial institutions: Shaktikanta Das
37. EU Contract Notice: GRDF Issues contract notice|solicitation for 'Cybersecurity - Integration on Projects (ISP) and Integration on Evolutions (ISE)'
38. Zighra Awarded Contract with Canadian Coast Guard: Showcasing Multi-Sensor Fusion and AI for automated threat detection and situational awareness
39. USING AI TO DEVELOP ENHANCED CYBERSECURITY MEASURES
40. Comenius University in Bratislava Researcher Provides New Insights into Artificial Intelligence (Artificial Intelligence-Driven Facial Image Analysis for the Early Detection of Rare Diseases: Legal, Ethical, Forensic, and Cybersecurity ...)
41. New Education Data Have Been Reported by Researchers at National Research Council (Shaping the foundation of the SuperCyberKids Learning Framework: a comprehensive analysis of cybersecurity education initiatives)
42. Studies from Aalborg University Update Current Data on Engineering (Redefining Malware Sandboxing: Enhancing Analysis Through Sysmon and ELK Integration)
43. Study Findings from Microsoft Corporation (Microsoft Research) Update Knowledge in Human-Computer Interaction (Burnout in Cybersecurity Incident Responders: Exploring the Factors that Light the Fire)
44. Data on Data Streaming Detailed by Researchers at University of Texas (Heterogeneous Domain Adaptation for Multistream Classification On Cyber Threat Data)
45. Erasmus University Medical Center Researchers Describe Recent Advances in Cybersecurity (Frequency of self-directed dying in the Netherlands: research protocol of a cross-sectional mixed-methods study)
46. New Technology Study Results from University of Quebec Trois-Rivieres Described (Search Engine Optimization Poisoning: a Cybersecurity Threat Analysis and Mitigation Strategies for Small and Medium-sized Enterprises)
47. DND beefs up cybersecurity infrastructure and processes
48. Validation of Cybersecurity Framework for Threat Mitigation/Validación de framework de ciberseguridad para la mitigación de amenazas/Validação da estrutura de segurança cibernética para mitigação de ameaças
49. Breach analysis: SEC's X-Hack casts doubt on investments in cybersecurity
50. Summit underscores cutting-edge cybersecurity strategies
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.