167 results on '"Cyberterrorism -- Analysis"'
Search Results
2. CRIMES CIBERNÃTICOS, PRIVACIDADE E CIBERSEGURANÃA/Cybercrimes, privacy and cybersecurity
3. Study Findings from Shri Mata Vaishno Devi University Update Knowledge in Cybersecurity (Mapping of organizational deviance research during the last two decades: a bibliometric approach)
4. Research from Zhejiang University of Technology in the Area of Cybersecurity Described (MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs)
5. Sungkyunkwan University Researchers Update Current Data on Cybersecurity (Optimum noise mechanism for differentially private queries in discrete finite sets)
6. Formación y concienciación en ciberseguridad basada en competencias: una revisión sistemática de literatura/Competency-based cybersecurity training and awareness: a systematic literature review
7. Universidad Internacional Researcher Reports on Findings in Electronics (Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada)
8. University of Le Havre Researcher Targets Cybersecurity and Privacy (An Approach for Anomaly Detection in Network Communications Using k-Path Analysis)
9. New Findings Reported from Kongu Engineering College Describe Advances in Terrorism (Cybersecurity and Cyber-terrorism Challenges To Energy-related Infrastructures - Cybersecurity Frameworks and Economics - Comprehensive Review)
10. Studies from Institute of Information Engineering in the Area of Cybersecurity Described (Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy)
11. Cloud Security Alliance Announces Additional Mappings Between Cloud Controls Matrix (CCM) and National Institute of Standards and Technology's (NIST) Cybersecurity Framework (CFT)
12. The hawks and doves of cybersecurity
13. Interior Minister reviews cyber security, other measures at NADRA
14. Characterizing Cybersecurity Threats to Organizations in Support of Risk Mitigation Decisions
15. Enterprise Cybersecurity: Pivoting From Traditional Measures To Innovative Strategies
16. AI increases cybersecurity challenges manifold for financial institutions: Shaktikanta Das
17. EU Contract Notice: GRDF Issues contract notice|solicitation for 'Cybersecurity - Integration on Projects (ISP) and Integration on Evolutions (ISE)'
18. Comenius University in Bratislava Researcher Provides New Insights into Artificial Intelligence (Artificial Intelligence-Driven Facial Image Analysis for the Early Detection of Rare Diseases: Legal, Ethical, Forensic, and Cybersecurity ...)
19. New Education Data Have Been Reported by Researchers at National Research Council (Shaping the foundation of the SuperCyberKids Learning Framework: a comprehensive analysis of cybersecurity education initiatives)
20. Study Findings from Microsoft Corporation (Microsoft Research) Update Knowledge in Human-Computer Interaction (Burnout in Cybersecurity Incident Responders: Exploring the Factors that Light the Fire)
21. Erasmus University Medical Center Researchers Describe Recent Advances in Cybersecurity (Frequency of self-directed dying in the Netherlands: research protocol of a cross-sectional mixed-methods study)
22. New Technology Study Results from University of Quebec Trois-Rivieres Described (Search Engine Optimization Poisoning: a Cybersecurity Threat Analysis and Mitigation Strategies for Small and Medium-sized Enterprises)
23. Validation of Cybersecurity Framework for Threat Mitigation/Validación de framework de ciberseguridad para la mitigación de amenazas/Validação da estrutura de segurança cibernética para mitigação de ameaças
24. ITI REACTS TO PROPOSED CYBERSECURITY MATURITY MODEL CERTIFICATION RULE
25. Why federal efforts to protect schools from cybersecurity threats fall short
26. Researchers from Karachi Institute of Economics and Technology Publish New Studies and Findings in the Area of Sustainability Research (Psychological profiling of hackers via machine learning toward sustainable cybersecurity)
27. Custom Bid For Services For - Technical Evaluation|Eligibility Criteria For Cyber Security Services. Qty : 1
28. Cybersecurity Capability Maturity Model (c2m2) Assessment for Vietnam Electricity (evn)
29. AV-Comparatives: The Premier Resource for Comprehensive Cybersecurity Information for Journalists and Analysts
30. AV-Comparatives: The Premier Resource for Comprehensive Cybersecurity Information for Journalists and Analysts
31. Study Findings on Cybersecurity and Privacy Discussed by a Researcher at University of Wyoming (Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis)
32. Nozomi Networks Delivers Industry's First AI-powered Cybersecurity Analysis and Response Engine for Critical Infrastructure
33. Effective Network Segmentation Can Mitigate Rising Cybersecurity Threats, According to Info-Tech Research Group
34. HHS CYBERSECURITY TASK FORCE PROVIDES NEW RESOURCES TO HELP ADDRESS RISING THREAT OF CYBERATTACKS IN HEALTH AND PUBLIC HEALTH SECTOR
35. Growing Threat of Cyberattack and Data Breaches Spurs Adoption of VPNs
36. Provision Of Cybersecurity Services
37. World Trade Organization: Committee on Technical Barriers to Trade - Notification - Brazil - Cybersecurity minimum requirements for conformity assessment of CPE (Customer Premises Equipment) to mitigate vulnerabilities - Addendum
38. Disruptions from Ransomware and Cyberattacks on Supply Chains and Critical Infrastructure Sharpen Focus on OT Security for 2023, TXOne Networks and Frost & Sullivan Analysis Reveals
39. Disruptions from Ransomware and Cyberattacks on Supply Chains and Critical Infrastructure Sharpen Focus on OT Security for 2023, TXOne Networks and Frost & Sullivan Analysis Reveals
40. New Computer Science Research from Cybersecurity Laboratory Described (Unbalanced Web Phishing Classification through Deep Reinforcement Learning)
41. Public Order Of Analysis Of The Existing State Of Cyber Security And Security Culture Of The Client, System Security Review And Implementation Of Training In The Field Of Cyber Security
42. Managing cybersecurity threats
43. World Trade Organization: Committee on Technical Barriers to Trade - Notification - Brazil - Cybersecurity minimum requirements for conformity assessment of CPE (Customer Premises Equipment) to mitigate vulnerabilities
44. EU Contract Notice: National Cyber Security Directorate Issues contract notice|solicitation for 'Romania-Bucharest: Computer training services'
45. Information disclosure and the diffusion of information security attacks
46. CYBERSECURITY IN MEDICAL DEVICES: QUALITY SYSTEM CONSIDERATIONS AND CONTENT OF PREMARKET SUBMISSIONS
47. Findings from University of Michigan-Dearborn Provide New Insights into Cybersecurity (Automated Cybersecurity Tester for IEC61850-Based Digital Substations)
48. Studies from Sindh Agriculture University Have Provided New Data on Cybersecurity (Analyzing ML-Based IDS over Real-Traffic)
49. AHA-SUPPORTED CYBERSECURITY BILL CLEARS COMMITTEE
50. AHA VOICES SUPPORT FOR HEALTH CARE CYBERSECURITY BILL
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.