Search

Your search keyword '"vulnerabilities"' showing total 225 results

Search Constraints

Start Over You searched for: Descriptor "vulnerabilities" Remove constraint Descriptor: "vulnerabilities" Topic threats Remove constraint Topic: threats
225 results on '"vulnerabilities"'

Search Results

1. IoT Security in a Connected World: Analyzing Threats, Vulnerabilities, and Mitigation Strategies

2. The Challenge of Adversarial Attacks on AI-Driven Cybersecurity Systems.

3. UAV Security Analysis Framework

6. A Survey on Security Threats and Network Vulnerabilities in Internet of Things

7. Security Analysis in Smart Agriculture: Insights from a Cyber-Physical System Application.

8. Mitigation of security risks at maritime ports of entry.

9. Assessing the Effectiveness of ADS-B Mitigations.

10. CYBERSECURITY RISKS IN INDIAN DIGITAL BANKING: AN IN-DEPTH ANALYSIS".

11. Cyber5Gym: An Integrated Framework for 5G Cybersecurity Training.

12. Cybersecurity challenges in IoT-based smart renewable energy.

13. A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives.

14. Cyber attacks on UAV networks: A comprehensive survey.

15. Cybersecurity risk analysis of multifunctional UAV fleet systems: a conceptual model and IMECA-based technique

16. THE ROLE OF GENDER-BASED ANALYSIS IN ENHANCING SOCIETAL SECURITY. A CASE STUDY OF ROMANIA’S APPROACH TO COVID-19 PANDEMIC AND ITS IMPACT ON A SELECT NUMBER OF GENDER CATEGORIES

20. Cybersecurity for Industrial IoT, Threats, Vulnerabilities, and Solutions: A Brief Review

21. Adaptive Social Protection for Poor Families

22. Security Approaches for Smart Campus

24. CYBERSECURITY RISK ANALYSIS OF MULTIFUNCTIONAL UAV FLEET SYSTEMS: A CONCEPTUAL MODEL AND IMECA-BASED TECHNIQUE.

25. THE ROLE OF GENDER-BASED ANALYSIS IN ENHANCING SOCIETAL SECURITY. A CASE STUDY OF ROMANIA'S APPROACH TO COVID-19 PANDEMIC AND ITS IMPACT ON A SELECT NUMBER OF GENDER CATEGORIES.

27. A Security Provocation in Cloud-Based Computing

31. STRATEGIC ANALYSIS OF UKRAINE’S SECURITY ENVIRONMENT

32. Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions.

33. Analysis of key threats to European security and the Republic of Moldova

35. ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations [version 3; peer review: 2 approved, 1 approved with reservations]

36. Research on the assessment of the risk situations emergence for automated control systems of the metallurgical industry companies.

37. ANALYSIS OF RISK TERMINAL FLOWS IN TECHNOGENIC SYSTEMS ARISING IN THE PROCESS OF THREAT IMPACT.

38. Internet of Things (IoT): Vulnerabilities and Remediation Strategies

39. Conceptual Model of Information Security

40. Intelligent Strategies for Cloud Computing Risk Management and Testing

41. ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations [version 2; peer review: 2 approved, 1 approved with reservations]

42. AN ADAPTIVE FRAMEWORK FOR COMBATING ADVANCED PERSISTENT THREATS.

43. Information Security Risk for Welfare Technology and Personal Healthcare Devices.

45. Distributed Operating System Security and Protection: A Short Survey

47. CYBER TERRORISM: A CRITICAL ASSESSMENT OF THE THREAT LANDSCAPE AND COUNTERMEASURES.

48. Mechanisms and techniques to enhance the security of big data analytic framework with MongoDB and Linux Containers

49. Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions

50. Investigating IPv6 Addressing Model with Security Approach and Compare It with IPv4 Model

Catalog

Books, media, physical & digital resources