9,149 results on '"Cyber security"'
Search Results
202. Defining the Maritime Cyber Adversarial Taxonomy of Tactics and Techniques
203. Security Threats and Data Protection Methods Used in Cloud Computing: A Review
204. AI Enhanced Cyber Security Methods for Anomaly Detection
205. A State of the Art Review on Artificial Intelligence-Enabled Cyber Security in Smart Grid
206. Adaptation of STPA-sec: A Case Study in the Socio-Technical Control Inputs Taxonomies for Health Information Cyber Security
207. Identification of Cyber Threats and Vulnerabilities in Norwegian Distribution Networks
208. Multi-objective Optimal Feature Selection for Cyber Security Integrated with Deep Learning
209. Detecting Multi-class Hostile Traffic in the Network Using a Hybrid Model
210. The New Craft of Intelligence: Information Operations and Cyber Security
211. AggNoteBot: A Robust Botnet Building Using Aggressive Cloud Notes
212. An Encrypted Traffic Classification Framework Based on Higher-Interaction-Graph Neural Network
213. Zonal Architecture and HW-Driven Protections for Software-Defined Vehicles
214. Developing a Hybrid Pseudo-Random Numbers Generator
215. Security and Reliability Concerns of AI on Critical Embedded Systems
216. Enhancing Malware Detection Through Machine Learning Using XAI with SHAP Framework
217. Cognitive Digital Twins for Improving Security in IT-OT Enabled Healthcare Applications
218. Why Do Organizations Fail to Practice Cyber Resilience?
219. Empowering Distributed Solutions in Renewable Energy Systems and Grid Optimization
220. An Impact of Cyber Security and Blockchain in Healthcare Industry: An Implementation Through AI
221. Opportunities and Challenges in New Generation Cyber Security Applications Using Artificial Intelligence, Machine Learning and Block Chain
222. International Mechanisms on Peace and Security in the Age of Artificial Intelligence
223. A Business Process and Data Modelling Approach to Enhance Cyber Security in Smart Cities
224. Cybersecurity and Cyber Defense in the Light of New Technologies in Cyberspace
225. Enhancing Cybersecurity with IDS and SIEM Integration Detection
226. Securing Confidential Information on WhatsApp with Blockchain Technology
227. Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends
228. Towards a Better Understanding of Cyber Awareness Amongst Migrant Communities in Australia
229. Quantum Computing Challenges and Impact on Cyber Security
230. Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing
231. Using Multivariate Heuristic Analysis for Detecting Attacks in Website Log Files: A Formulaic Approach
232. Security Challenges and Solutions in Smart Cities
233. Importance of Implementing Effective Cyber Security Controls for Active Cyber Security Risk Management
234. Malicious Website Detection Using BorderlineSMOTE2NCR Sampling and Cost-Sensitive Ensemble Learning
235. Assessing the Challenges Faced by Security Operations Centres (SOC)
236. Enhancing Cybersecurity in Industrial Control Systems Through GRC Framework: Principles, Regulations, and Risk Assessment
237. Process Mining with Programmable Logic Controller Memory States
238. Cyber Resilience for SDG Towards the Digitization: An Imperial Study
239. Fake News Detection Using Machine Learning
240. An Opportunity-Based Approach to Information Security Risk
241. Great Power Competition and Cyber Security
242. Ransomware Classification and Detection: A Supervised Machine Learning Approach
243. Skade – A Challenge Management System for Cyber Threat Hunting
244. Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain
245. Uncovering the Threat: Exploring Covert Channel Attacks Via Audio Files in Android Applications
246. Towards the Testbed and Dataset for Analysis of Water Treatment Systems Security
247. Malicious URL Detection Using Transformers’ NLP Models and Machine Learning
248. Secure Software Development Life Cycle: An Approach to Reduce the Risks of Cyber Attacks in Cyber Physical Systems and Digital Twins
249. A Comparative Analysis of Deep Learning Approaches for Enhancing Security in Web Applications
250. Cyber Security-Related Awareness in Bangladesh: Relevant Challenges and Strategies
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.