Search

Your search keyword '"Cyberterrorism -- Analysis"' showing total 167 results

Search Constraints

Start Over You searched for: Descriptor "Cyberterrorism -- Analysis" Remove constraint Descriptor: "Cyberterrorism -- Analysis" Topic data security -- analysis Remove constraint Topic: data security -- analysis
167 results on '"Cyberterrorism -- Analysis"'

Search Results

1. Cybersecurity GenAI features: Are they worth the money?

4. Research from Zhejiang University of Technology in the Area of Cybersecurity Described (MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs)

7. Universidad Internacional Researcher Reports on Findings in Electronics (Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada)

8. University of Le Havre Researcher Targets Cybersecurity and Privacy (An Approach for Anomaly Detection in Network Communications Using k-Path Analysis)

9. New Findings Reported from Kongu Engineering College Describe Advances in Terrorism (Cybersecurity and Cyber-terrorism Challenges To Energy-related Infrastructures - Cybersecurity Frameworks and Economics - Comprehensive Review)

10. Studies from Institute of Information Engineering in the Area of Cybersecurity Described (Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy)

11. Cloud Security Alliance Announces Additional Mappings Between Cloud Controls Matrix (CCM) and National Institute of Standards and Technology's (NIST) Cybersecurity Framework (CFT)

13. Interior Minister reviews cyber security, other measures at NADRA

14. Characterizing Cybersecurity Threats to Organizations in Support of Risk Mitigation Decisions

15. Enterprise Cybersecurity: Pivoting From Traditional Measures To Innovative Strategies

16. AI increases cybersecurity challenges manifold for financial institutions: Shaktikanta Das

17. EU Contract Notice: GRDF Issues contract notice|solicitation for 'Cybersecurity - Integration on Projects (ISP) and Integration on Evolutions (ISE)'

18. Comenius University in Bratislava Researcher Provides New Insights into Artificial Intelligence (Artificial Intelligence-Driven Facial Image Analysis for the Early Detection of Rare Diseases: Legal, Ethical, Forensic, and Cybersecurity ...)

19. New Education Data Have Been Reported by Researchers at National Research Council (Shaping the foundation of the SuperCyberKids Learning Framework: a comprehensive analysis of cybersecurity education initiatives)

20. Study Findings from Microsoft Corporation (Microsoft Research) Update Knowledge in Human-Computer Interaction (Burnout in Cybersecurity Incident Responders: Exploring the Factors that Light the Fire)

21. Erasmus University Medical Center Researchers Describe Recent Advances in Cybersecurity (Frequency of self-directed dying in the Netherlands: research protocol of a cross-sectional mixed-methods study)

22. New Technology Study Results from University of Quebec Trois-Rivieres Described (Search Engine Optimization Poisoning: a Cybersecurity Threat Analysis and Mitigation Strategies for Small and Medium-sized Enterprises)

24. ITI REACTS TO PROPOSED CYBERSECURITY MATURITY MODEL CERTIFICATION RULE

25. Why federal efforts to protect schools from cybersecurity threats fall short

26. Researchers from Karachi Institute of Economics and Technology Publish New Studies and Findings in the Area of Sustainability Research (Psychological profiling of hackers via machine learning toward sustainable cybersecurity)

28. Cybersecurity Capability Maturity Model (c2m2) Assessment for Vietnam Electricity (evn)

29. AV-Comparatives: The Premier Resource for Comprehensive Cybersecurity Information for Journalists and Analysts

30. AV-Comparatives: The Premier Resource for Comprehensive Cybersecurity Information for Journalists and Analysts

31. Study Findings on Cybersecurity and Privacy Discussed by a Researcher at University of Wyoming (Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis)

32. Nozomi Networks Delivers Industry's First AI-powered Cybersecurity Analysis and Response Engine for Critical Infrastructure

33. Effective Network Segmentation Can Mitigate Rising Cybersecurity Threats, According to Info-Tech Research Group

34. HHS CYBERSECURITY TASK FORCE PROVIDES NEW RESOURCES TO HELP ADDRESS RISING THREAT OF CYBERATTACKS IN HEALTH AND PUBLIC HEALTH SECTOR

35. Growing Threat of Cyberattack and Data Breaches Spurs Adoption of VPNs

36. Provision Of Cybersecurity Services

37. World Trade Organization: Committee on Technical Barriers to Trade - Notification - Brazil - Cybersecurity minimum requirements for conformity assessment of CPE (Customer Premises Equipment) to mitigate vulnerabilities - Addendum

38. Disruptions from Ransomware and Cyberattacks on Supply Chains and Critical Infrastructure Sharpen Focus on OT Security for 2023, TXOne Networks and Frost & Sullivan Analysis Reveals

39. Disruptions from Ransomware and Cyberattacks on Supply Chains and Critical Infrastructure Sharpen Focus on OT Security for 2023, TXOne Networks and Frost & Sullivan Analysis Reveals

40. New Computer Science Research from Cybersecurity Laboratory Described (Unbalanced Web Phishing Classification through Deep Reinforcement Learning)

41. Public Order Of Analysis Of The Existing State Of Cyber Security And Security Culture Of The Client, System Security Review And Implementation Of Training In The Field Of Cyber Security

42. Managing cybersecurity threats

43. World Trade Organization: Committee on Technical Barriers to Trade - Notification - Brazil - Cybersecurity minimum requirements for conformity assessment of CPE (Customer Premises Equipment) to mitigate vulnerabilities

44. EU Contract Notice: National Cyber Security Directorate Issues contract notice|solicitation for 'Romania-Bucharest: Computer training services'

45. Information disclosure and the diffusion of information security attacks

46. CYBERSECURITY IN MEDICAL DEVICES: QUALITY SYSTEM CONSIDERATIONS AND CONTENT OF PREMARKET SUBMISSIONS

47. Findings from University of Michigan-Dearborn Provide New Insights into Cybersecurity (Automated Cybersecurity Tester for IEC61850-Based Digital Substations)

48. Studies from Sindh Agriculture University Have Provided New Data on Cybersecurity (Analyzing ML-Based IDS over Real-Traffic)

49. AHA-SUPPORTED CYBERSECURITY BILL CLEARS COMMITTEE

50. AHA VOICES SUPPORT FOR HEALTH CARE CYBERSECURITY BILL

Catalog

Books, media, physical & digital resources