Search

Your search keyword '"Cyber threats"' showing total 648 results

Search Constraints

Start Over You searched for: Descriptor "Cyber threats" Remove constraint Descriptor: "Cyber threats" Topic business Remove constraint Topic: business
648 results on '"Cyber threats"'

Search Results

1. DIGITAL TRANSFORMATION VULNERABILITIES: ASSESSING THE RISKS AND STRENGTHENING CYBER SECURITY

2. Features of manifestation and neutralization of risks of economic security in the processes of digitalization

3. The Operational-Technological Risk and its Impact on the Status of a Contemporary Banking Institution

4. A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks

5. A study on classification of the security controls for the effective implementation to nuclear power plant

6. A Fog-Centric Secure Cloud Storage Scheme

7. Machine Learning and Deep Learning

8. Cyber Diplomacy And Protection Measures Against Threats Of Information Communication Technology In Indonesia

9. Cybersecurity Awareness Enhancement: A Study of the Effects of Age and Gender of Thai Employees Associated with Phishing Attacks

10. Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies

11. Informing Cyber Threat Intelligence through Dark Web Situational Awareness: The AZSecure Hacker Assets Portal

12. Russian Schoolchildren vs. Cyber Threats: Research in the Framework of Modern Childhood Digitalization

13. Radiographers’ perspectives on the emerging integration of artificial intelligence into diagnostic imaging: The Ghana study

14. The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review

15. РАЗВОЈ И ИНТЕГРАЦИЈА SIEM СОФТВЕРСКОГ РЕШЕЊА У SCADA СИСТЕМЕ

16. The principles of institutional and functional support of cybersecurity in modern conditions

17. Development a mathematical model for the software security testing first stage

18. Color-Optimized One-Pixel Attack Against Digital Pathology Images

20. Aviation cyber security: legal aspects of cyber threats

21. A Theoretical review on the importance of Threat Intelligence Sharing & The challenges intricated

22. An Empirical Investigation of the Relationship between Local Government Budgets, IT Expenditures, and Cyber Losses

23. Aspects of protection of accounting data in the conditions of use of innovation and information technologies

24. Real-Time Monitoring of Network Devices: Its Effectiveness in Enhancing Network Security

25. Fostering sustainable development through the European Digital Single Market

26. ARTIFICIAL INTELLIGENCE: AN INSTRUMENT ENSURING CYBERSECURITY OF THE FINANCIAL SPHERE OR A CYBER THREAT TO BANKS?

27. Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence

28. Prospects for the Development of the banking sector of Azerbaijan

30. Security Aspects of Healthcare Organization from the Perspective of Digitization of Facility Management

31. RISK MANAGEMENT IN THE FINANCIAL SECTOR OF UKRAINE IN THE CONTEXT OF CYBER THREATS AND POST-PANDEMIC ECONOMIC RECOVERY

32. Deep Learning Modalities for Biometric Alteration Detection in 5G Networks-Based Secure Smart Cities

33. PECULIARITIES OF THE FORMATION OF SECURE CYBERSPACE IN THE DIGITAL ECONOMY

35. Cyber Threats in the Healthcare Sector and Countermeasures

36. Guest Editorial: Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures

37. Advanced computing and endogenous security

38. Development of a method for assessing cybernetic security in special-purpose information systems

39. Virtual Dispersive Network in the Prevention of Third Party Interception: A Way of Dealing with Cyber Threat

40. METHODS OF ENSURING CYBER SECURITY OF CRITICAL COMPONENTSNETWORKS OF INFORMATION AND TELECOMMUNICATION SYSTEM

41. Security and Privacy in IoT Using Machine Learning and Blockchain

42. THE SOUTH KOREAN CYBER POLICY IN PROMOTING ACTIVE INTERNET USERS AND ITS VULNERABILITIES IN CYBER THREATS

43. Cyber treats of digital society and their prevention in the context of victimological activities

44. Confronting Cyber Threats to Your Practice

48. Deep learning to combat phishing

49. Cyber Threat Intelligence: A Product Without a Process?

50. Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach

Catalog

Books, media, physical & digital resources