Search

Your search keyword '"computer crime"' showing total 246 results

Search Constraints

Start Over You searched for: Descriptor "computer crime" Remove constraint Descriptor: "computer crime"
246 results on '"computer crime"'

Search Results

1. Digital Forensics and Computer Crimes: The Case of North Macedonia.

2. KOMPJUTERSKI KRIMINAL I ORGANIZOVANI KRIMINAL U FEDERACIJI BOSNI I HERCEGOVINI.

3. El control del cibercrimen. Análisis exploratorio de sentencias y medidas de supervisión.

4. Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning.

5. A Probabilistic Analysis of Cyber Risks.

6. Cybersecurity: Perceived Threats and Policy Responses in the Gulf Cooperation Council.

7. Platform-Dependent Computer Security Complacency: The Unrecognized Insider Threat.

8. A Study of Chinese Policy Attention on Cybersecurity.

9. Investigation of the Effect of e-Platform Information Security Breaches: A Small and Medium Enterprise Supply Chain Perspective.

10. Organized Cyber-Racketeering: Exploring the Role of Internet Technology in Organized Cybercrime Syndicates Using a Grounded Theory Approach.

11. Antecedents of Cybersecurity Implementation: A Study of the Cyber-Preparedness of U.K. Social Enterprises.

12. Resilience Enhancement of Pilot Protection in Power Systems.

13. Organizational Architecture, Resilience, and Cyberattacks.

14. A Switched Newton–Raphson-Based Distributed Energy Management Algorithm for Multienergy System Under Persistent DoS Attacks.

15. Fuga de información por ultrasonido: un delito sobre datos personales.

16. LTC: A Fast Algorithm to Accurately Find Significant Items in Data Streams.

17. Enhanced Side-Channel Analysis on ECDSA Employing Fixed-Base Comb Method.

18. Blockchain-Based Decentralized Replay Attack Detection for Large-Scale Power Systems.

19. Artist Collectives as the Origins of DDoS the Strano Network and Electronic Disturbance Theater.

20. Game Attack–Defense Graph Approach for Modeling and Analysis of Cyberattacks and Defenses in Local Metering System.

21. Security of Cyber-Physical Systems: Design of a Security Supervisor to Thwart Attacks.

22. Adaptive NN Finite-Time Resilient Control for Nonlinear Time-Delay Systems With Unknown False Data Injection and Actuator Faults.

23. Vulnerability Identification and Remediation of FDI Attacks in Islanded DC Microgrids Using Multiagent Reinforcement Learning.

24. Análisis de seguridad entre microservicios con Amazon Web Service.

25. Cyber-Resilient Sliding-Mode Consensus Secondary Control Scheme for Islanded AC Microgrids.

26. Design of Networked Secure and Real-Time Control Based on Blockchain Techniques.

27. Distributed Denial of Service (DDoS): A History.

28. Resilient Containment of Multigroup Systems Against Unknown Unbounded FDI Attacks.

29. Multilayered Diagnostics for Smart Cities.

30. A Security Mechanism for IEEE C37.118.2 PMU Communication.

31. An Indoor Crowd Movement Trajectory Benchmark Dataset.

32. An Empirical Investigation of the Effects of Individuality on Responses to Data Theft Crimes.

33. Detection and Differentiation of Replay Attack and Equipment Faults in SCADA Systems.

34. FR-RED: Fractal Residual Based Real-Time Detection of the LDoS Attack.

35. Secure Estimation and Attack Isolation for Connected and Automated Driving in the Presence of Malicious Vehicles.

36. Nearly Optimal Integral Sliding-Mode Consensus Control for Multiagent Systems With Disturbances.

37. Event-Triggered Output Feedback Synchronization of Master–Slave Neural Networks Under Deception Attacks.

38. Hackathons 101.

39. Quantifying Cyber Attacks on Industrial MMC-HVDC Control System Using Structured Pseudospectrum.

40. Deeply Hidden Moving-Target-Defense for Cybersecure Unbalanced Distribution Systems Considering Voltage Stability.

41. Decentralized Consensus Decision-Making for Cybersecurity Protection in Multimicrogrid Systems.

42. Pandemic Parallels: What Can Cybersecurity Learn From COVID-19?

43. An Actuarial Framework for Power System Reliability Considering Cybersecurity Threats.

44. Secure State Estimation and Control of Cyber-Physical Systems: A Survey.

45. SOChain: A Privacy-Preserving DDoS Data Exchange Service Over SOC Consortium Blockchain.

46. Historical Consciousness of Cyber Security in India.

47. The Economics of Cyberattacks on Brazil.

48. 21 Years of Distributed Denial-of-Service: A Call to Action.

49. 21 Years of Distributed Denial-of Service: Current State of Affairs.

50. On the 2-Adic Complexity of the Ding-Helleseth-Martinsen Binary Sequences.

Catalog

Books, media, physical & digital resources