Search

Your search keyword '"Cyber threats"' showing total 227 results

Search Constraints

Start Over You searched for: Descriptor "Cyber threats" Remove constraint Descriptor: "Cyber threats" Database Complementary Index Remove constraint Database: Complementary Index
227 results on '"Cyber threats"'

Search Results

1. The use of multi-task learning in cybersecurity applications: a systematic literature review.

2. ПРАВОВІ ОСНОВИ РЕГЛАМЕНТАЦІЇ КІБЕРБЕЗПЕКИ

3. An intelligent system for multi-topic social spam detection in microblogging.

4. The impact of blockchain and artificial intelligence technologies in network security for e-voting.

5. An AI-Driven Model to Enhance Sustainability for the Detection of Cyber Threats in IoT Environments.

6. ДОСВІД УКРАЇНИ В ГАЛУЗІ МІЖНАРОДНОГО СПІВРОБІТНИЦТВА В ГАЛУЗІ КІБЕРБЕЗПЕКИ

7. Cyberbiosecurity in the new normal: Cyberbio risks, pre-emptive security, and the global governance of bioinformation.

8. Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems.

9. Privacy-Preserving Federated Learning-Based Intrusion Detection Technique for Cyber-Physical Systems.

10. Deep Learning Based Intrusion Detection System of IoT Technology: Accuracy Versus Computational Complexity.

11. The 2024 EU elections and cybersecurity: A retrospective and lessons learned.

12. Enhancing Cybersecurity Awareness through Gamification: Design an Interactive Cybersecurity Learning Platform for Multimedia University Students.

13. Revisiting Mobile Payment Risk-Reduction Strategies: A Cross-Country Analysis.

14. Analysis of modern types of cyberterrorism and methods for countering them.

15. A Survey of Bug Bounty Programs in Strengthening Cybersecurity and Privacy in the Blockchain Industry.

16. Evading Cyber-Attacks on Hadoop Ecosystem: A Novel Machine Learning-Based Security-Centric Approach towards Big Data Cloud.

17. Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection.

18. Cyber Insurance Need of the Hour: To Combat Growing Cyber-Attacks within Cyber Space.

19. Security against Cyber Threats Using Artificial Intelligence.

20. SOCIAL MEDIA LANDSCAPE IN THE REPUBLIC OF KAZAKHSTAN: NAVIGATING YOUTH BEHAVIOR AND ENSURING INFORMATION SECURITY.

21. SPAȚIUL CIBERNETIC - ADAPTARE LA PROVOCĂRI.

22. ПРОБЛЕМАТИКА І ПІДХОДИ ПІДВИЩЕННЯ РІВНЯ ЗАХИСТУ В КАНАЛАХ ПЕРЕДАЧІ ДАНИХ СИСТЕМ І ПРИСТРОЇВ ІНТЕРНЕТУ РЕЧЕЙ.

23. SAFER SENIOR CITIZENS ONLINE.

24. The accelerated integration of artificial intelligence systems and its potential to expand the vulnerability of the critical infrastructure.

25. A Cybersecurity Collaborative Model: Best Practices Sharing Among South African Tourism and Hospitality Businesses.

26. DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets.

27. Secure File Operations: Using Advanced Encryption Standard for Strong Data Protection.

28. Disinformation, influence, and hybrid threats: thoughts from Singapore.

29. MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms.

30. Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks.

31. Cyber threats to the Private Academic Cloud.

32. Development of the Country's Sustainable Cyberspace Strategy to Ensure the Country's National Security.

33. Cybersecurity Implications of Virtual Currency Reward Systems in the Metaverse.

34. Analysis of Cyber Threats at the Level of a Distributed Network.

35. Cyber Threats and Exploring the Sources of Cyber Threat Intelligence.

36. A National Security Perspective on Strengthening E.U. Civilian-Defence Cybersecurity Synergy: A Systemic Approach.

37. Machine Learning Algorithms to Identify Cyber Threats Using Logistic Regression.

38. Cyber Security on the Edge: Efficient Enabling of Machine Learning on IoT Devices.

39. ОСОБЛИВОСТІ ВІДПОВІДАЛЬНОСТІ ЗА КІБЕРАТАКИ В КРАЇНАХ ЄС.

40. The Social Network Dilemma: Safeguarding Privacy and Security in an Online Community.

41. Ransomware Threats in Industrial Internet of Things Networks: A Detection Approach.

42. A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments.

43. Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage.

44. Optimizing Intrusion Detection Mechanisms for IoT Network Security.

45. Забезпечення кібербезпеки системи багатофункційних флотів БПЛА для моніторингу критичної інфраструктури: аналіз вразливостей, атак і контрзаходів.

46. МЕТОД ОЦІНЮВАННЯ РІВНЯ ПІДВИЩЕННЯ СТАНУ КІБЕРЗАХИСТУ ОБ’ЄКТІВ КРИТИЧНОЇ ІНФРАСТРУКТУРИ ДЕРЖАВИ.

47. BUILDING A CONCEPT FOR CYBER SECURITY OF AN EDUCATIONAL ORGANIZATION IN BULGARIA.

48. ENHANCING CYBER SECURITY AND COUNTERINTELLIGENCE IN THE SHIPPING INDUSTRY.

49. NIST CSF 2.0: НОВИЙ ФРЕЙМВОРК З КІБЕРБЕЗПЕКИ ВІД НАЦІОНАЛЬНОГО ІНСТИТУТУ СТАНДАРТІВ І ТЕХНОЛОГІЙ США.

50. СИСТЕМА ОЦІНЮВАННЯ ПІДВИЩЕННЯ СТАНУ КІБЕРЗАХИСТУ ОБ’ЄКТІВ ОГЛЯДУ КРИТИЧНОЇ ІНФРАСТРУКТУРИ ДЕРЖАВИ.

Catalog

Books, media, physical & digital resources