Search

Your search keyword '"Internet security"' showing total 156,688 results

Search Constraints

Start Over You searched for: Descriptor "Internet security" Remove constraint Descriptor: "Internet security"
156,688 results on '"Internet security"'

Search Results

1. Supply chain cybersecurity investments with interdependent risks under different information exchange modes.

2. Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach.

3. Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective.

4. INSURANCE HACKERS.

6. Reflecting on Research Practices.

7. The Dangers of Digitization, and the Importance of Data Backup.

8. Beat the scammers: Protect yourself with the help of your Mac and iPhone

9. Beat the scammers: Protect yourself with the help of I your Mac and iPhone

10. New Demands On The Audit Committee

11. A multi-objective framework for the identification and optimisation of factors affecting cybersecurity in the Industry 4.0 supply chain.

12. FLOLSTM: Fuzzy logic‐driven optimized LSTM for improved malicious traffic detection in hypervisor environments.

13. Enhancing UAV‐HetNet security through functional encryption framework.

14. BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network.

15. Leveraging deep learning-assisted attacks against image obfuscation via federated learning.

16. Women in Intelligence: A Dynamic and Integrative Literature Review.

17. Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries.

18. A new early warning system based on metaheuristics in CPS architecture.

19. Research on intent-driven resilience network security.

20. Cybersecurity Workforce Landscape, Education, and Industry Growth Prospects in Southeast Asia.

21. LIVE STREAMING OF COURT PROCEEDINGS IN INDIA: A STEP TOWARDS STRENGTHENING THE ACCESS TO A TRANSPARENT AND AN ACCOUNTABLE JUDICIARY.

22. How blockchain manages supply chain risks: evidence from Indian manufacturing companies.

23. X-Detect: explainable adversarial patch detection for object detectors in retail.

24. A lightweight distributed ELM-based security framework for the internet of vehicles.

25. Drafting a Cybersecurity Standard for Outer Space Missions: On Critical Infrastructure, China, and the Indispensability of a Global Inclusive Approach.

26. Building capability and community through cyber-incident response exercises.

27. GSAAN with War Strategy Optimization Algorithm for Cyber Security in a 5G Wireless Communication Network.

28. The PIM.3 process improvement process—Part of the iNTACS certified process expert training.

29. Navigation safety of Maritime Autonomous Surface Ships.

30. Network disruption via continuous batch removal: The case of Sicilian Mafia.

31. Cybersecurity vulnerabilities and solutions in Ethiopian university websites.

32. Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation.

33. Improving patient centric data retrieval and cyber security in healthcare: privacy preserving solutions for a secure future.

34. Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems.

35. Effecting mobile security awareness and interest in cybersecurity using the CovertEyeOp mobile app driven user hack based learning approach.

36. BVTED: A Specialized Bilingual (Chinese–English) Dataset for Vulnerability Triple Extraction Tasks.

37. Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities.

38. Enhancing internet of things security using entropy-informed RF-DNA fingerprint learning from Gabor-based images.

39. Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada.

40. A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm.

41. Identification and prioritization of the challenges faced by vendor organizations in the shape of cyber security: A FUZZY‐AHP ‐based systematic approach.

42. When You Think You Are About to Hesitate, Step Forward. Increase Freedom and Trust People in the Field.

43. Email bombing attack detection and mitigation using machine learning.

44. IoT cybersecurity in 5G and beyond: a systematic literature review.

45. Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle.

46. Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis.

47. Analysis of security and privacy issues in wearables for minors.

48. A Review of Attacker–Defender Games and Cyber Security.

49. Revisión sistemática de la literatura sobre la seguridad digital en estudiantes de educación superior.

50. The Role of Cybersecurity Knowledge and Awareness in Cybersecurity Intention and Behavior in the United States.

Catalog

Books, media, physical & digital resources