Search

Your search keyword '"Cyber security"' showing total 9,140 results

Search Constraints

Start Over You searched for: Descriptor "Cyber security" Remove constraint Descriptor: "Cyber security"
9,140 results on '"Cyber security"'

Search Results

1. BehaMiner: System Behavior Mining for Audit Log Based on Graph Learning

3. An Ensemble Machine Learning-Based Approach for Detecting Malicious Websites Using URL Features

5. Quantum-Enhanced Cyber Security Framework for E-Commerce Platforms

6. MEGA-PT: A Meta-game Framework for Agile Penetration Testing

7. Implementation of Recent Advancements in Cyber Security Practices and Laws in India

9. To secure an e‐commerce system using epidemic mathematical modeling with neural network.

10. A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling.

11. An approach for real-time implementation of cyber security in power system network.

12. Cyber risk logics and their implications for cybersecurity.

13. Digital recognition: cybersecurity and internet infrastructure in UAE–Israel diplomacy.

14. The new geopolitics of EU cybersecurity: security, economy and sovereignty.

15. A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks.

16. Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking.

17. Total Power Factor Smart Contract with Cyber Grid Guard Using Distributed Ledger Technology for Electrical Utility Grid with Customer-Owned Wind Farm.

18. A Novel Cloud-Enabled Cyber Threat Hunting Platform for Evaluating the Cyber Risks Associated with Smart Health Ecosystems.

19. A Survey of Advanced Border Gateway Protocol Attack Detection Techniques.

20. The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure.

21. Robust Federated Learning for Mitigating Advanced Persistent Threats in Cyber-Physical Systems.

22. A Digital Twin-Based Approach for Detecting Cyber–Physical Attacks in ICS Using Knowledge Discovery.

23. A Hybrid Genetic Algorithm and Neural Network-Based Cyber Security Approach for Enhanced Detection of DDoS and Malware Attacks in Wide Area Networks.

24. Detection of DDoS Attacks using Fine-Tuned Multi-Layer Perceptron Models.

25. Enhancing Internet of Things Intrusion Detection Using Artificial Intelligence.

26. Domain knowledge free cloud-IDS with lightweight embedding method.

27. A novel approach of botnet detection using hybrid deep learning for enhancing security in IoT networks.

28. Clop Ransomware in Action: A Comprehensive Analysis of Its Multi-Stage Tactics.

29. An improved transformer‐based model for detecting phishing, spam and ham emails: A large language model approach.

30. Applications of Fuzzy Logic and Probabilistic Neural Networks in E-Service for Malware Detection.

31. Evading Cyber-Attacks on Hadoop Ecosystem: A Novel Machine Learning-Based Security-Centric Approach towards Big Data Cloud.

32. BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network.

33. Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries.

34. ДО ПРОБЛЕМИ ВИЗНАЧЕННЯ ТА РОЗМЕЖУВАННЯ ДЕФІНІЦІЙ «ІНФОРМАЦІЙНА БЕЗПЕКА» І «КІБЕРБЕЗПЕКА»

35. ПИТАННЯ ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ ПРИ ВИКОРИСТАННІ ХМАРНИХ ТЕХНОЛОГІЙ

36. DEEP LEARNING BASED NETWORK INTRUSION DETECTION.

37. Surveillance and Five Eyes: Changing Dimensions of India's Cyber Security.

38. Protecting Digital Assets: Government Initiatives and NGOs Participation.

39. Network Intrusion Detection Method Based on Improved Multi-factorial Optimization Bat Algorithm.

40. Building capability and community through cyber-incident response exercises.

41. A hierarchical hybrid intrusion detection model for industrial internet of things.

42. X-Detect: explainable adversarial patch detection for object detectors in retail.

43. Anomaly Detection Using Data Rate of Change on Medical Data.

44. The Impact of Artificial Intelligence on Cyber Security.

45. 面向稳控系统E1通道的网络靶场实验台的 设计与实现.

46. Enhanced anomaly traffic detection framework using BiGAN and contrastive learning

47. A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling

48. FinSafeNet: securing digital transactions using optimized deep learning and multi-kernel PCA(MKPCA) with Nyström approximation

49. Data Leakage of the Indonesian Elections Commission in Legal Aspects of Personal Data Protection

50. ARTIFICIAL INTELLIGENCE TECHNOLOGIES: A NEW ERA FOR CRIME PREVENTION

Catalog

Books, media, physical & digital resources