Search

Your search keyword '"Internet security"' showing total 158,474 results

Search Constraints

Start Over You searched for: Descriptor "Internet security" Remove constraint Descriptor: "Internet security"
158,474 results on '"Internet security"'

Search Results

51. Holistic Information Security Management and Compliance Framework.

52. Unsupervised Learning for Lateral-Movement-Based Threat Mitigation in Active Directory Attack Graphs.

53. Provably Quantum Secure Three-Party Mutual Authentication and Key Exchange Protocol Based on Modular Learning with Error.

54. ProtectingSmall and Medium Enterprises: A Specialized Cybersecurity Risk Assessment Framework and Tool.

55. Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification.

56. Robust Federated Learning for Mitigating Advanced Persistent Threats in Cyber-Physical Systems.

57. Cyber Security within Smart Cities: A Comprehensive Study and a Novel Intrusion Detection-Based Approach.

58. Economic statecraft by design and by default: The political economy of the 5G-Huawei bans in the United States, United Kingdom and Germany.

59. The impact of the Digital Operational Resilience Act on financial market infrastructures in Europe: Received (in revised form): 3rd June, 2024.

60. Analysis assaulting pattern for the security problem monitoring in 5G‐enabled sensor network systems with big data environment using artificial intelligence/machine learning.

61. Malware Detection Using Dual Siamese Network Model.

62. An edge-assisted group authentication scheme for the narrowband internet of things.

63. Digital Forensics and Incident Response (DFIR): A Teaching Exercise.

64. A model proposal for enhancing cyber security in industrial IoT environments.

65. Development of a Cryptographic Model Using Digits Classification for Cyber Security Applications.

66. A Hybrid Genetic Algorithm and Neural Network-Based Cyber Security Approach for Enhanced Detection of DDoS and Malware Attacks in Wide Area Networks.

67. Fortifying network security: machine learning-powered intrusion detection systems and classifier performance analysis.

68. An empirical study for mitigating sustainable cloud computing challenges using ISM-ANN.

69. A novel image encryption method based on improved two-dimensional logistic mapping and DNA computing.

70. Optimal Blind Focusing on Perturbation‐Inducing Targets in Sub‐Unitary Complex Media.

71. Enhancing Cybersecurity in Healthcare: Evaluating Ensemble Learning Models for Intrusion Detection in the Internet of Medical Things.

72. Advanced Micro/Nanocapsules for Self-Healing Coatings.

73. A Survey on Penetration Path Planning in Automated Penetration Testing.

74. Autonomous Vehicle Ecosystem Security: Utilizing Autonomous Vehicle Security-Level Checks through Analytic Hierarchy Process.

75. Clop Ransomware in Action: A Comprehensive Analysis of Its Multi-Stage Tactics.

76. An Approach to Maritime Cyber Security Risks: Nature and Countermeasures.

77. Middle powers and minilateralism against hybrid threats in the Indo-Pacific: South Korea, Singapore, and Taiwan.

78. FLOLSTM: Fuzzy logic‐driven optimized LSTM for improved malicious traffic detection in hypervisor environments.

79. Enhancing UAV‐HetNet security through functional encryption framework.

80. DeepRoughNetID: A Robust Framework for Network Anomaly Intrusion Detection with High Detection Rates.

81. Secure system with security protocol for interactions in healthcare Internet of Things.

82. Applications of Fuzzy Logic and Probabilistic Neural Networks in E-Service for Malware Detection.

83. Fortifying Industry 4.0: Internet of Things Security in Cloud Manufacturing through Artificial Intelligence and Provenance Blockchain—A Thematic Literature Review.

84. Towards an Innovative Model for Cybersecurity Awareness Training.

85. ANALYSIS OF AN ENHANCED RANDOM FOREST ALGORITHM FOR IDENTIFYING ENCRYPTED NETWORK TRAFFIC.

86. Energy-Efficient Anomaly Detection and Chaoticity in Electric Vehicle Driving Behavior.

87. SpecRep: Adversary Emulation Based on Attack Objective Specification in Heterogeneous Infrastructures.

88. Malware Identification Method in Industrial Control Systems Based on Opcode2vec and CVAE-GAN.

89. Green Intrusion Detection Systems: A Comprehensive Review and Directions.

90. BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network.

91. Leveraging deep learning-assisted attacks against image obfuscation via federated learning.

92. Women in Intelligence: A Dynamic and Integrative Literature Review.

93. Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries.

94. A new early warning system based on metaheuristics in CPS architecture.

95. Cobalt Strike: A Cyber Assessment Challenge.

96. Complex Challenges of Space Cybersecurity and Their Implications for the ROK.

97. Using data clustering to reveal trainees' behavior in cybersecurity education.

98. Cascade failure modeling and resilience analysis of mine cyber physical systems under deliberate attacks.

99. Video and Audio Deepfake Datasets and Open Issues in Deepfake Technology: Being Ahead of the Curve.

100. Advancing XSS Detection in IoT over 5G: A Cutting-Edge Artificial Neural Network Approach.

Catalog

Books, media, physical & digital resources