7,654 results
Search Results
2. Cybersecurity for Teens (CS4T) – A Project by Ludoteca of Registro .it
3. Workshop Report for IFIP WG 13.2’s HCSE@INTERACT 2023 : International Workshop on Human-Centered Software Engineering: Rethinking the Interplay of Human–Computer Interaction and Software Engineering in the Age of Digital Transformation
4. Adoption of Explainable Artificial Intelligence, to Protect Key Decision Processes from Information Manipulations and Disorders (Work in Progress)
5. Workshop on Cybersecurity of Critical Infrastructures
6. The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments
7. A Systematic Literature Review of Ransomware Detection Methods and Tools for Mitigating Potential Attacks
8. Vulnerability Analysis of an Electric Vehicle Charging Ecosystem
9. Mapping and Analysis of Common Vulnerabilities in Popular Web Servers
10. Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting
11. Hierarchical Model-Based Cybersecurity Risk Assessment During System Design
12. A Comparative Analysis of Blockchain-Based Authentication Models for IoT Networks
13. A Hybrid Deep Learning Approach for Accurate Network Intrusion Detection Using Traffic Flow Analysis in IoMT Domain
14. Process Mining Algorithm for Online Intrusion Detection System
15. A Critical Node-Centric Approach to Enhancing Network Security
16. Improving Cybersecurity Capabilities at Nikola Vaptsarov Naval Academy by Building and Developing a Security Operations and Training Center
17. Showing Evidence of Safeguarding Networks in Cyber-Physical Domains by Societal Impact Assessment
18. Challenges and Opportunities for Network Intrusion Detection in a Big Data Environment
19. Learning CyberSecurity with Story-Driven CTF Challenges: CyberTrials 2023
20. Examining the Consequences of Cyberattacks on Businesses and Organizations
21. Digital Supply Chain Roles in the Power Industry
22. Examining Telework Adoption Through Cybersecurity and Industry 5.0
23. Securing Autonomous Vehicles: Fundamentals, Challenges, and Perspectives
24. Phishing Detection Using 1D-CNN and FF-CNN Models Based on URL of the Website
25. CONTINGENT: Advanced Solution to Enhance Cyber Resilience Through Machine Learning Techniques
26. Virtual IoT Laboratory Through a Hands-on Approach in Educational Environments
27. Intelligent Computing Techniques for Sustainable Cybersecurity: Enhancing Threat Detection and Response
28. An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection
29. The Effacement of Information Technology from EU Law: The Need for Collaborative Approaches to Redesign the EU’s Regulatory Architecture
30. Impact of Machine Learning in Cybersecurity: A Critical Review with Insights on the Internet of Things
31. Towards a Supervised Machine Learning Algorithm for Cyberattacks Detection and Prevention in a Smart Grid Cybersecurity System
32. A Review and Analysis of Cybersecurity Threats and Vulnerabilities, by Development of a Fuzzy Rule-Based Expert System
33. Cybersecurity in University Students: A Systematic Review of the Literature
34. Intrusion Detection System Using Machine Learning
35. CO-DECYBER: Co-operative Decision Making for Cybersecurity Using Deep Multi-agent Reinforcement Learning
36. Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms
37. Attacking at Non-harmonic Frequencies in Screaming-Channel Attacks
38. Guidelines for the Adoption of Artificial Intelligence in Identity and Access Management Within the Financial Services Sector
39. Computer Vision-Based Cybersecurity Threat Detection System with GAN-Enhanced Data Augmentation
40. On the Use of VGs for Feature Selection in Supervised Machine Learning - A Use Case to Detect Distributed DoS Attacks
41. Methodology of Expert-Agent Cognitive Modeling for Preventing Impact on Critical Information Infrastructure
42. Enhancing Security in Connected Medical IoT Networks Through Deep Learning-Based Anomaly Detection
43. Leveraging Graph Neural Networks for Botnet Detection
44. Cyber Security Threats in the Public Hosting Services
45. Approaching Cyber Situational Awareness Through Digital Services Availability Monitoring and Threat Intelligence: The MonSys Platform Experience
46. The Intersectionality of Offensive Cybersecurity and Human Factors: A Position Paper
47. Attacks and Defenses of Smart Speakers: Voice Command Fingerprinting on Alexa
48. Developing Blockchain Learning Lab Experiments for Enhancing Cybersecurity Knowledge and Hands-On Skills in the Cloud
49. On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security
50. Evaluation Metrics for a Hybrid Classification System Based on the Distributivity Equation and the UNSW-NB15 Cyberattack Dataset
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.