Search

Your search keyword '"Cyberterrorism"' showing total 142,777 results

Search Constraints

Start Over You searched for: Descriptor "Cyberterrorism" Remove constraint Descriptor: "Cyberterrorism"
142,777 results on '"Cyberterrorism"'

Search Results

1. WE DID NOT CHOOSE THIS MOMENT. BUT IT FALLS TO US TO MEET IT.

3. BEWARE! The Blue Screen of Death: The recent global IT outage sparked by an erroneous software update from cybersecurity company CrowdStrike has amplified calls for crisis planning and should prompt pro AV customers to take a fresh look at their crisis resilience, writes Ken Dunn

4. THE SIX EVENTS OF THE ARMY CYBER FITNESS TEST

5. The War Lab.

6. INSURANCE HACKERS.

7. ПРОБЛЕМИ АКТІВ КІБЕРТЕРОРИЗМУ В УМОВАХ ВОЄННОГО СТАНУ

8. ЗАГРОЗИ ОБ'ЄКТАМ КРИТИЧНОЇ ІНФРАСТРУКТУРИ УКРАЇНИ В УМОВАХ ВОЄННОГО СТАНУ

9. ПРОБЛЕМА ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ В КІБЕРПРОСТОРІ

10. КІБЕРБЕЗПЕКА В УМОВАХ СУЧАСНИХ ЗАГРОЗ: ІЗРАЇЛЬСЬКИЙ ДОСВІД І ЙОГО ЗАСТОСУВАННЯ В УКРАЇНІ

11. ПЕРСПЕКТИВИ І ВИКЛИКИ ДЛЯ ПАРЛАМЕНТАРИЗМУ В УМОВАХ РОЗВИТКУ ЦИФРОВОГО КОНСТИТУЦІОНАЛІЗМУ.

12. Fusion of machine learning and blockchain-based privacy-preserving approach for healthcare data in the Internet of Things.

13. ПРАВОВЕ РЕГУЛЮВАННЯ ЗАХИСТУ НАСЕЛЕННЯ ПРИ РАДІАЦІЙНИХ НАДЗВИЧАЙНИХ СИТУАЦІЯХ НА АТОМНИХ СТАНЦІЯХ В УМОВАХ ВОЄННОГО СТАНУ.

14. The evolution of EU–US cybersecurity law and policy: on drivers of convergence.

15. A machine learning-based ensemble model for securing the IoT network.

16. A network intrusion detection system based on deep learning in the IoT.

17. A lightweight and secure authentication protocol for visually impaired and handicapped people in the telehealth system.

18. Class imbalanced data handling with cyberattack classification using Hybrid Salp Swarm Algorithm with deep learning approach.

19. Organisational cyber resilience: a heuristic for bridging foundations and applications.

20. IWTW: A Framework for IoWT Cyber Threat Analysis.

21. The Machine Learning Ensemble for Analyzing Internet of Things Networks: Botnet Detection and Device Identification.

22. Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based on Statistical Intelligence.

23. Optimal Cyber Attack Strategy Using Reinforcement Learning Based on Common Vulnerability Scoring System.

24. Strengthening network DDOS attack detection in heterogeneous IoT environment with federated XAI learning approach.

25. Event‐Triggered Secure Control of Positive Networked Control Systems Under Multi‐Channels Attacks.

26. Machine learning approaches to intrusion detection in unmanned aerial vehicles (UAVs).

27. A novel adaptive event‐triggered security consensus control mechanism for leader‐following multi‐agent systems under hybrid random cyber attacks.

28. Attention-Enhanced Defensive Distillation Network for Channel Estimation in V2X mm-Wave Secure Communication.

29. The Intersection of Machine Learning and Wireless Sensor Network Security for Cyber-Attack Detection: A Detailed Analysis.

30. Focal Causal Temporal Convolutional Neural Networks: Advancing IIoT Security with Efficient Detection of Rare Cyber-Attacks.

31. Press play, install malware: a study of rhythm game-based malware dropping.

32. Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network.

33. Survey-based analysis of cybersecurity awareness of Turkish seafarers.

34. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system.

35. Design tactics for tailoring transformer architectures to cybersecurity challenges.

36. Efficient hashing technique for malicious profile detection at hypervisor environment.

37. Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment.

38. Enhanced Machine Learning Based Network Traffic Detection Model for IoT Network.

39. Anomaly detection technique for securing microgrid against false data attacks.

40. CONTRIBUTION TO THREAT MANAGEMENT THROUGH THE USE OF AIBASED IDS.

41. Unsupervised Learning for Lateral-Movement-Based Threat Mitigation in Active Directory Attack Graphs.

42. Study on Prediction and Response Model for Threat Diffusion Based on Multi-Step Reachability Matrix.

43. ProtectingSmall and Medium Enterprises: A Specialized Cybersecurity Risk Assessment Framework and Tool.

44. A Study on Designing Cyber Training and Cyber Range to Effectively Respond to Cyber Threats.

45. Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification.

46. Robust Federated Learning for Mitigating Advanced Persistent Threats in Cyber-Physical Systems.

47. Intelligent and Secure Cloud–Edge Collaborative Industrial Information Encryption Strategy Based on Credibility Assessment.

48. The potential for artificial intelligence to address challenges faced by custodian banks: Received (in revised form): 14th May, 2024.

49. MV-Honeypot: Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms.

50. Cyberterrorism in Africa -- Is This the Real Life, Is This Just Fantasy?

Catalog

Books, media, physical & digital resources