70 results on '"Cyber"'
Search Results
2. Examining the Landscape of Unauthorised Cyber Access (with Reference to POSTnote #684)
3. Novel Security Mechanism for AI Enabled Wastewater Treatment Systems
4. Smart Textile Industry: Threats and Opportunities
5. Enhancing Cyber Threat Intelligence and Security Automation: A Comprehensive Approach for Effective Protection
6. Traditional Human Duties and the Challenges of Digitization
7. Critical Infrastructure
8. Cyber Resilience as a New Strategy to Reduce the Impact of Cyber Threats
9. Cyberdiplomacy
10. Cyber Risks: Social, Functional, and Ethical Dimensions
11. A Global Overview of Data Security, Safety, Corporate Data Privacy, and Data Protection
12. Cybersecurity Compliance Requirements for USA Department of Defense Contractors - Dragons at the Gate
13. Cyber Sovereignty: Should Cyber Borders Replicate Territorial Borders?
14. Are Small Medium Enterprises Cyber Aware?
15. Additional Security Considerations for Cloud
16. Cyber
17. The Need to Inoculate Military Servicemembers Against Information Threats: The Case for Digital Literacy Training for the Force
18. Cyber and Great Power Competition in the Western Hemisphere
19. Research Questions in the Acceptance of Cybersecurity by SMEs in the EU
20. The Impact of Big Data and IoT for Computational Smarter Education System
21. Trust Issues with Wireless Internet Devices
22. Islamic Republic of Iran (Iran)
23. Al Qaeda
24. Introduction and Background
25. Analysis, Findings, Assessment
26. Cost-Effective Detection of Cyber Physical System Attacks
27. Chapter The metapolis – cities between a ripple and a blur
28. Conceptual Model for a Shared Cybersecurity Operations Center for ICS
29. Cybersecurity: Policy
30. Digital Technology, Cyber Security, and the Public Service Challenge in Australia
31. The Impact of Cybersecurity on the Rescue System of Regional Governments in SmartCities
32. Stakeholders Involved in Hospitals’ Crisis Management Processes
33. Robot Networks and Their Impact on Cyber Security and Protection from Attacks: A Review
34. Towards a Global CIs’ Cyber-Physical Security Management and Joint Coordination Approach
35. Chapter Le molestie sessuali online tra adolescenti: che cosa sono e come si manifestano
36. Information Warfare and Cyber Education: Issues and Recommendations
37. Deception : Its Use and Abuse in the Social Sciences
38. Bio-inspired Deoxyribonucleic Acid Based Data Obnubilating Using Enhanced Computational Algorithms
39. A Deep Neural Network Strategy to Distinguish and Avoid Cyber-Attacks
40. Towards Agent Validation of a Military Cyber Team Performance Simulation
41. Challenging CPS Trade-off Adaptivity with Coarse-Grained Reconfiguration
42. Künstliche Intelligenz als sicherheitspolitische Herausforderung
43. Modeling and Simulation Approaches
44. Fundamental Concepts of Cyber Resilience: Introduction and Overview
45. Cyber Weapons Storage Mechanisms
46. Considerations for Human-Machine Teaming in Cybersecurity
47. Covert Channel Cyber-Attack over Video Stream DCT Payload : (Copyright Protection Algorithm for Video and Audio Streams)
48. Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems
49. Jedi and Starmen—Cyber in the Service of the Light Side of the Force
50. Culture + Cyber: Exploring the Relationship
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.