Search

Your search keyword '"Cyber threats"' showing total 23 results

Search Constraints

Start Over You searched for: Descriptor "Cyber threats" Remove constraint Descriptor: "Cyber threats" Database Supplemental Index Remove constraint Database: Supplemental Index
23 results on '"Cyber threats"'

Search Results

1. A lightweight and secure authentication protocol for visually impaired and handicapped people in the telehealth system.

2. Cyberattacks: Economic Impacts and Risk Management Strategies.

3. Economic Impact of Cyber Attacks and Effective Cyber Risk Management Strategies: A light literature review and case study analysis.

4. A Framework to Prevent Cybercrime in the UAE.

5. ENHANCING INFORMATION SECURITY IN MULTIMEDIA STREAMS THROUGH LOGIC LEARNING MACHINE ASSISTED MOTH-FLAME OPTIMIZATION.

6. Web Application Security through Comprehensive Vulnerability Assessment.

8. ONTOLOGY FOR BLIND SQL INJECTION.

9. Securing Digital Collections: Cyber Security Best Practices for Academic Libraries in Developing Countries.

10. PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks.

11. A federated learning-based zero trust intrusion detection system for Internet of Things.

12. Üniversitelerdeki Siber Güvenlik Sorunları ve Farkındalık Eğitimleri.

13. SecureFlow: Knowledge and data-driven ensemble for intrusion detection and dynamic rule configuration in software-defined IoT environment.

14. Cybersecurity Resiliency of Marine Renewable Energy Systems-Part 1: Identifying Cybersecurity Vulnerabilities and Determining Risk.

15. UNDERSTANDING CYBER ESPIONAGE: Tutorial.

16. Information security of RFID tags.

17. Keep Dreaming: Cyber Arms Control is Not a Viable Policy Option.

18. SIMULATION MODELLING AND ASSESSING THE IMPACT OF CYBERATTACKS ON URBAN AUTOMOBILE TRANSPORT SYSTEMS.

19. Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users.

20. A Comparative Analysis between Two Countermeasure Techniques to Detect DDoS with Sniffers in a SCADA Network.

21. THE IMPACT OF THE LEADERSHIP ROLE ON HUMAN FAILURES IN THE FACE OF CYBER THREATS.

22. Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis.

23. Consumers' attitudes toward information security threats against connected and autonomous vehicles.

Catalog

Books, media, physical & digital resources