Search

Your search keyword '"Cyber threats"' showing total 1,841 results

Search Constraints

Start Over You searched for: Descriptor "Cyber threats" Remove constraint Descriptor: "Cyber threats"
1,841 results on '"Cyber threats"'

Search Results

51. Machine Learning, Malware Detection: SecureAI

53. Security Analysis of Meteorological Support Software for UAS Flight Planning

55. Cybersecurity and Cyber Defense in the Light of New Technologies in Cyberspace

56. Cybersecurity Threats in Military Robotic and Autonomous Systems

57. Importance of Implementing Effective Cyber Security Controls for Active Cyber Security Risk Management

58. The Impact of Technology on Radicalisation to Violent Extremism and Terrorism in the Contemporary Security Landscape

59. Introduction : Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses

60. Study of Cyber Threats in IoT Systems

61. Impact of cyber security awareness in small, medium enterprises (SMEs) in Wales

62. Developing a usable security approach for user awareness against ransomware

63. Cyber threats to the Private Academic Cloud

64. DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets

65. Detection of «Telegram Rat» virus

66. DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets.

67. Secure File Operations: Using Advanced Encryption Standard for Strong Data Protection.

68. Disinformation, influence, and hybrid threats: thoughts from Singapore.

69. MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms.

70. Cyber threats to the Private Academic Cloud.

71. A Framework to Prevent Cybercrime in the UAE.

72. Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks.

73. Development of the Country's Sustainable Cyberspace Strategy to Ensure the Country's National Security.

74. Cyber-biological convergence: a systematic review and future outlook

76. Cybersecurity Implications of Virtual Currency Reward Systems in the Metaverse.

77. Analysis of Cyber Threats at the Level of a Distributed Network.

78. Cyber Threats and Exploring the Sources of Cyber Threat Intelligence.

79. A National Security Perspective on Strengthening E.U. Civilian-Defence Cybersecurity Synergy: A Systemic Approach.

80. Machine Learning Algorithms to Identify Cyber Threats Using Logistic Regression.

81. Application of modern technologies to ensure operational reliability and safety in energy systems of Azerbaijan

82. Enhancing Malicious URL Detection: A Novel Framework Leveraging Priority Coefficient and Feature Evaluation

83. Detecting Unbalanced Network Traffic Intrusions With Deep Learning

84. A Human-in-the-Loop Anomaly Detection Architecture for Big Traffic Data of Cellular Network

85. Securing Smart Grid Data With Blockchain and Wireless Sensor Networks: A Collaborative Approach

86. Online Banking User Authentication Methods: A Systematic Literature Review

87. An AI-Driven Model to Enhance Sustainability for the Detection of Cyber Threats in IoT Environments

88. Privacy-Preserving Federated Learning-Based Intrusion Detection Technique for Cyber-Physical Systems

89. Cyberterrorism : understanding, assessment, and response.

92. Cyber Security on the Edge: Efficient Enabling of Machine Learning on IoT Devices.

93. ОСОБЛИВОСТІ ВІДПОВІДАЛЬНОСТІ ЗА КІБЕРАТАКИ В КРАЇНАХ ЄС.

94. The Social Network Dilemma: Safeguarding Privacy and Security in an Online Community.

95. Ransomware Threats in Industrial Internet of Things Networks: A Detection Approach.

96. A Comprehensive Approach to Cyberattack Detection in Edge Computing Environments.

97. Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage.

98. Optimizing Intrusion Detection Mechanisms for IoT Network Security.

99. Забезпечення кібербезпеки системи багатофункційних флотів БПЛА для моніторингу критичної інфраструктури: аналіз вразливостей, атак і контрзаходів.

100. МЕТОД ОЦІНЮВАННЯ РІВНЯ ПІДВИЩЕННЯ СТАНУ КІБЕРЗАХИСТУ ОБ’ЄКТІВ КРИТИЧНОЇ ІНФРАСТРУКТУРИ ДЕРЖАВИ.

Catalog

Books, media, physical & digital resources