Search

Your search keyword '"cyber security"' showing total 9,553 results

Search Constraints

Start Over You searched for: Descriptor "cyber security" Remove constraint Descriptor: "cyber security"
9,553 results on '"cyber security"'

Search Results

201. Cyber Security of the Economy and Public Finances: Historiography and Post-War Trajectory of Development

202. On the issue of criminal law protection of cyber security of Ukraine in modern conditions

203. Trends, challenges and solutions of digital information security in Central and Eastern Europe

204. Unveiling the Efficacy of AI-based Algorithms in Phishing Attack Detection

205. Enhanced Image-Based Malware Multiclass Classification Method with the Ensemble Model and SVM

206. DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets

207. BETWEEN GLOBAL VULNERABILITIES AND REGIONAL REALITIES: CYBERSECURITY DYNAMICS IN EASTERN EUROPE

208. Ethical Provision of Online Learning in South African High Schools

209. The Role of Artificial Intelligence in Enhancing Cyber Security using Deep Learning Techniques: A Review

210. Analysis of Information Security Under the Conditions of Hybrid War in Ukraine: Social Aspects

211. Cyber Challenges amid the Digital Revolution in Maritime Transport

212. BELGIUM REBOOTS CYBER-STRATEGY: CYBERSECURITY PLAN 2.0 (2021-2025).

213. Impact of cyber security awareness in small, medium enterprises (SMEs) in Wales

214. Teacher, enforcer, soothsayer, scapegoat : the purpose of the CISO in commercial organisations

215. Distinct difference configurations in groups

216. An empirical study of establishing guidelines for evaluation and adoption of secure and cost effective cloud computing

217. Efficient hybrid fuzzing for detecting vulnerabilities and achieving high coverage in software

218. Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation.

219. Improving patient centric data retrieval and cyber security in healthcare: privacy preserving solutions for a secure future.

220. DEVISING A METHOD FOR DETECTING INFORMATION THREATS IN THE UKRAINIAN CYBER SPACE BASED ON MACHINE LEARNING.

221. Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks.

222. A Review of Attacker–Defender Games and Cyber Security.

223. Email bombing attack detection and mitigation using machine learning.

224. Healthcare provider data breaches – framework for crisis communication and support of patients and healthcare workers in mental healthcare.

225. Sosialisasi Kesadaran Keamanan Siber dan Perlindungan Data Pribadi Bagi Warga di Kelurahan Pangkalan Jati, Kota Depok.

226. Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices.

227. Enhancing Smart Grid Security with SHA-SARIMAX: Identifying and Restoring Corrupted Files from FDIA.

228. Advancing cybersecurity: a comprehensive review of AI-driven detection techniques.

229. An Incident Management System Design to Protect Critical Infrastructures from Cyber Attacks.

230. A systematic literature review of mitigating cyber security risk.

231. Network Forensics Analysis of Cyber Attacks Carried Out Over Wireless Networks Using Machine Learning Methods.

232. Secure aware software development life cycle on medical datasets by using firefly optimization and machine learning techniques.

233. A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques.

234. Optimizing neural networks using spider monkey optimization algorithm for intrusion detection system.

235. Navigating digital divide: exploring the influence of ideological and political education on cyber security and digital literacy amid information warfare.

236. Exploring the role of artificial intelligence in enhancing battery performance and mitigating cybersecurity threats in electric vehicles: A systematic literature review.

237. Enhancing intrusion detection: a hybrid machine and deep learning approach.

238. User behaviour's contribution to better Cyber Security Management.

239. Bridging the Cybersecurity Gap in India: Legal, Technical, and Public Awareness Issues.

240. Security against Cyber Threats Using Artificial Intelligence.

241. Investigating Cybercrime News Reporting in Indian Online News Media.

242. A data-driven ensemble technique for the detection of false data injection attacks in the smart grid framework.

243. Interactive Use of Deep Learning and Ethereum Blockchain for the Security of IIoT Sensor Data.

244. ШТУЧНИЙ ІНТЕЛЕКТ У ВІЙСЬКОВІЙ КІБЕРСФЕРІ

245. Adversarial waypoint injection attacks on Maritime Autonomous Surface Ships (MASS) collision avoidance systems.

246. 体系化构造:美国保密基础设施立法及启示.

247. CONSIDERAȚII PRIVIND IMPLICAȚIILE UTILIZĂRII INTELIGENȚEI ARTIFICIALE GENERATIVE, INCLUSIV DIN PERSPECTIVA LEGII PENALE.

248. What do high school students know about the field of cyber security? A survey of perception and experiences.

249. Siber Güvenlik Çalışmaları Üzerine Bibliyometrik Analiz.

250. Unveiling the Impact of Extreme Learning Machine in the Defence and Military Sector.

Catalog

Books, media, physical & digital resources