Search

Your search keyword '"Cyber threats"' showing total 1,841 results

Search Constraints

Start Over You searched for: Descriptor "Cyber threats" Remove constraint Descriptor: "Cyber threats"
1,841 results on '"Cyber threats"'

Search Results

1. Evaluating the Effectiveness of Machine Learning, Deep Learning, and Evolutionary Algorithms in Intrusion Detection Systems

3. Categories of Cyber Crimes, Case Study and Security

4. The use of multi-task learning in cybersecurity applications: a systematic literature review.

5. ПРАВОВІ ОСНОВИ РЕГЛАМЕНТАЦІЇ КІБЕРБЕЗПЕКИ

6. An intelligent system for multi-topic social spam detection in microblogging.

7. The impact of blockchain and artificial intelligence technologies in network security for e-voting.

8. An AI-Driven Model to Enhance Sustainability for the Detection of Cyber Threats in IoT Environments.

9. Cyberbiosecurity in the new normal: Cyberbio risks, pre-emptive security, and the global governance of bioinformation.

10. A lightweight and secure authentication protocol for visually impaired and handicapped people in the telehealth system.

11. ДОСВІД УКРАЇНИ В ГАЛУЗІ МІЖНАРОДНОГО СПІВРОБІТНИЦТВА В ГАЛУЗІ КІБЕРБЕЗПЕКИ

12. Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems.

13. Privacy-Preserving Federated Learning-Based Intrusion Detection Technique for Cyber-Physical Systems.

14. Cyberattacks: Economic Impacts and Risk Management Strategies.

15. Economic Impact of Cyber Attacks and Effective Cyber Risk Management Strategies: A light literature review and case study analysis.

16. Deep Learning Based Intrusion Detection System of IoT Technology: Accuracy Versus Computational Complexity.

17. The 2024 EU elections and cybersecurity: A retrospective and lessons learned.

18. Enhancing Cybersecurity Awareness through Gamification: Design an Interactive Cybersecurity Learning Platform for Multimedia University Students.

19. Revisiting Mobile Payment Risk-Reduction Strategies: A Cross-Country Analysis.

20. Analysis of modern types of cyberterrorism and methods for countering them.

21. Automated Detection of Cybersecurity Threats Using Generative Adversarial Networks (GANs)

22. A lightweight and secure authentication protocol for visually impaired and handicapped people in the telehealth system

23. Enhancing Cybersecurity Awareness through Gamification: Design an Interactive Cybersecurity Learning Platform for Multimedia University Students

24. The accelerated integration of artificial intelligence systems and its potential to expand the vulnerability of the critical infrastructure

25. Development of the Country’s Sustainable Cyberspace Strategy to Ensure the Country’s National Security

26. Evading Cyber-Attacks on Hadoop Ecosystem: A Novel Machine Learning-Based Security-Centric Approach towards Big Data Cloud.

27. A Survey of Bug Bounty Programs in Strengthening Cybersecurity and Privacy in the Blockchain Industry.

28. Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection.

29. Cyber Insurance Need of the Hour: To Combat Growing Cyber-Attacks within Cyber Space.

30. Security against Cyber Threats Using Artificial Intelligence.

31. SOCIAL MEDIA LANDSCAPE IN THE REPUBLIC OF KAZAKHSTAN: NAVIGATING YOUTH BEHAVIOR AND ENSURING INFORMATION SECURITY.

32. SPAȚIUL CIBERNETIC - ADAPTARE LA PROVOCĂRI.

33. ПРОБЛЕМАТИКА І ПІДХОДИ ПІДВИЩЕННЯ РІВНЯ ЗАХИСТУ В КАНАЛАХ ПЕРЕДАЧІ ДАНИХ СИСТЕМ І ПРИСТРОЇВ ІНТЕРНЕТУ РЕЧЕЙ.

34. SAFER SENIOR CITIZENS ONLINE.

35. The accelerated integration of artificial intelligence systems and its potential to expand the vulnerability of the critical infrastructure.

36. A Cybersecurity Collaborative Model: Best Practices Sharing Among South African Tourism and Hospitality Businesses.

37. Bridging Language Gaps in Cybersecurity Governance

39. PhishGuard: Machine Learning Model for Real-Time URL Detection

40. Empowering Cyber Defenses: Shielding Against Man-in-the-Middle Attacks with Public Key Infrastructure (PKI)

42. Social Engineering Attacks Detection and Mitigation by Analyzing Human Interaction Patterns

43. Cyber Threats in Social Metaverse and Mitigation Techniques

44. Contemporary Strategies for Advancing Cybersecurity in Maritime Cargo Transportation

45. Overview of Current International Maritime Shipping Challenges from a Cyber Threat Perspective

48. A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud

Catalog

Books, media, physical & digital resources