Search

Showing total 7,654 results

Search Constraints

Start Over You searched for: Search Limiters Academic (Peer-Reviewed) Journals Remove constraint Search Limiters: Academic (Peer-Reviewed) Journals Topic cybersecurity Remove constraint Topic: cybersecurity
7,654 results

Search Results

2. Cybersecurity for Teens (CS4T) – A Project by Ludoteca of Registro .it

3. Workshop Report for IFIP WG 13.2’s HCSE@INTERACT 2023 : International Workshop on Human-Centered Software Engineering: Rethinking the Interplay of Human–Computer Interaction and Software Engineering in the Age of Digital Transformation

4. Adoption of Explainable Artificial Intelligence, to Protect Key Decision Processes from Information Manipulations and Disorders (Work in Progress)

5. Workshop on Cybersecurity of Critical Infrastructures

6. The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments

7. A Systematic Literature Review of Ransomware Detection Methods and Tools for Mitigating Potential Attacks

8. Vulnerability Analysis of an Electric Vehicle Charging Ecosystem

9. Mapping and Analysis of Common Vulnerabilities in Popular Web Servers

10. Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting

11. Hierarchical Model-Based Cybersecurity Risk Assessment During System Design

13. A Hybrid Deep Learning Approach for Accurate Network Intrusion Detection Using Traffic Flow Analysis in IoMT Domain

14. Process Mining Algorithm for Online Intrusion Detection System

15. A Critical Node-Centric Approach to Enhancing Network Security

19. Learning CyberSecurity with Story-Driven CTF Challenges: CyberTrials 2023

20. Examining the Consequences of Cyberattacks on Businesses and Organizations

21. Digital Supply Chain Roles in the Power Industry

23. Securing Autonomous Vehicles: Fundamentals, Challenges, and Perspectives

25. CONTINGENT: Advanced Solution to Enhance Cyber Resilience Through Machine Learning Techniques

28. An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection

29. The Effacement of Information Technology from EU Law: The Need for Collaborative Approaches to Redesign the EU’s Regulatory Architecture

30. Impact of Machine Learning in Cybersecurity: A Critical Review with Insights on the Internet of Things

31. Towards a Supervised Machine Learning Algorithm for Cyberattacks Detection and Prevention in a Smart Grid Cybersecurity System

32. A Review and Analysis of Cybersecurity Threats and Vulnerabilities, by Development of a Fuzzy Rule-Based Expert System

33. Cybersecurity in University Students: A Systematic Review of the Literature

34. Intrusion Detection System Using Machine Learning

35. CO-DECYBER: Co-operative Decision Making for Cybersecurity Using Deep Multi-agent Reinforcement Learning

36. Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms

37. Attacking at Non-harmonic Frequencies in Screaming-Channel Attacks

38. Guidelines for the Adoption of Artificial Intelligence in Identity and Access Management Within the Financial Services Sector

40. On the Use of VGs for Feature Selection in Supervised Machine Learning - A Use Case to Detect Distributed DoS Attacks

41. Methodology of Expert-Agent Cognitive Modeling for Preventing Impact on Critical Information Infrastructure

42. Enhancing Security in Connected Medical IoT Networks Through Deep Learning-Based Anomaly Detection

43. Leveraging Graph Neural Networks for Botnet Detection

46. The Intersectionality of Offensive Cybersecurity and Human Factors: A Position Paper

47. Attacks and Defenses of Smart Speakers: Voice Command Fingerprinting on Alexa

50. Evaluation Metrics for a Hybrid Classification System Based on the Distributivity Equation and the UNSW-NB15 Cyberattack Dataset