Search

Your search keyword '"Cyber security"' showing total 9,149 results

Search Constraints

Start Over You searched for: Descriptor "Cyber security" Remove constraint Descriptor: "Cyber security"
9,149 results on '"Cyber security"'

Search Results

201. A Survey of Cyber Range: Current Status, Analysis, and Future Trends

203. Security Threats and Data Protection Methods Used in Cloud Computing: A Review

204. AI Enhanced Cyber Security Methods for Anomaly Detection

205. A State of the Art Review on Artificial Intelligence-Enabled Cyber Security in Smart Grid

206. Adaptation of STPA-sec: A Case Study in the Socio-Technical Control Inputs Taxonomies for Health Information Cyber Security

207. Identification of Cyber Threats and Vulnerabilities in Norwegian Distribution Networks

208. Multi-objective Optimal Feature Selection for Cyber Security Integrated with Deep Learning

211. AggNoteBot: A Robust Botnet Building Using Aggressive Cloud Notes

214. Developing a Hybrid Pseudo-Random Numbers Generator

215. Security and Reliability Concerns of AI on Critical Embedded Systems

216. Enhancing Malware Detection Through Machine Learning Using XAI with SHAP Framework

217. Cognitive Digital Twins for Improving Security in IT-OT Enabled Healthcare Applications

218. Why Do Organizations Fail to Practice Cyber Resilience?

223. A Business Process and Data Modelling Approach to Enhance Cyber Security in Smart Cities

224. Cybersecurity and Cyber Defense in the Light of New Technologies in Cyberspace

226. Securing Confidential Information on WhatsApp with Blockchain Technology

227. Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends

228. Towards a Better Understanding of Cyber Awareness Amongst Migrant Communities in Australia

229. Quantum Computing Challenges and Impact on Cyber Security

230. Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing

231. Using Multivariate Heuristic Analysis for Detecting Attacks in Website Log Files: A Formulaic Approach

232. Security Challenges and Solutions in Smart Cities

233. Importance of Implementing Effective Cyber Security Controls for Active Cyber Security Risk Management

235. Assessing the Challenges Faced by Security Operations Centres (SOC)

236. Enhancing Cybersecurity in Industrial Control Systems Through GRC Framework: Principles, Regulations, and Risk Assessment

237. Process Mining with Programmable Logic Controller Memory States

239. Fake News Detection Using Machine Learning

240. An Opportunity-Based Approach to Information Security Risk

242. Ransomware Classification and Detection: A Supervised Machine Learning Approach

243. Skade – A Challenge Management System for Cyber Threat Hunting

244. Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain

245. Uncovering the Threat: Exploring Covert Channel Attacks Via Audio Files in Android Applications

246. Towards the Testbed and Dataset for Analysis of Water Treatment Systems Security

247. Malicious URL Detection Using Transformers’ NLP Models and Machine Learning

248. Secure Software Development Life Cycle: An Approach to Reduce the Risks of Cyber Attacks in Cyber Physical Systems and Digital Twins

249. A Comparative Analysis of Deep Learning Approaches for Enhancing Security in Web Applications

250. Cyber Security-Related Awareness in Bangladesh: Relevant Challenges and Strategies

Catalog

Books, media, physical & digital resources