Search

Your search keyword '"CYBERTERRORISM"' showing total 143,461 results

Search Constraints

Start Over You searched for: Descriptor "CYBERTERRORISM" Remove constraint Descriptor: "CYBERTERRORISM"
143,461 results on '"CYBERTERRORISM"'

Search Results

1. Human-Centered Cybersecurity Revisited: From Enemies to Partners.

2. WE DID NOT CHOOSE THIS MOMENT. BUT IT FALLS TO US TO MEET IT.

4. Spent Fuel Transportation Cybersecurity in the Energy Sector for Public Health and Safety: Whether you're moving spent fuel rods, military munitions or military equipment, the procedures described are similar for reducing and managing cybersecurity threats

5. BEWARE! The Blue Screen of Death: The recent global IT outage sparked by an erroneous software update from cybersecurity company CrowdStrike has amplified calls for crisis planning and should prompt pro AV customers to take a fresh look at their crisis resilience, writes Ken Dunn

6. The War Lab.

7. INSURANCE HACKERS.

8. An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing.

9. ПРАВОВІ ОСНОВИ РЕГЛАМЕНТАЦІЇ КІБЕРБЕЗПЕКИ

10. An intelligent system for multi-topic social spam detection in microblogging.

11. Asynchronous event‐triggered control for switched T–S fuzzy systems under dual‐channel hybrid cyber attacks.

12. Optimization of mitigation deployment using deep reinforcement learning over an enhanced ATT &CK.

13. How to Defend and Secure Deep Learning Models Against Adversarial Attacks in Computer Vision: A Systematic Review.

14. Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher.

15. A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection.

16. Probing the depths: assessing the efficacy of the two-tier deception-driven security model.

17. Cyber risk management strategies and integration: toward supply chain cyber resilience and robustness.

18. A novel secured open standard framework for internet of things applications integrating elliptic curve cryptography and fog computing.

19. Framework for detecting and resisting cyberattacks on cyberphysical systems in internet of things.

20. The impact of blockchain and artificial intelligence technologies in network security for e-voting.

21. Improving the transferability of adversarial examples with path tuning.

22. A novel approach for predicting the spread of APT malware in the network.

23. Exploring effective strategies against cyberattacks: the case of the automotive industry.

24. Building supply chain resilience to cyber risks: a dynamic capabilities perspective.

25. ПРОБЛЕМИ АКТІВ КІБЕРТЕРОРИЗМУ В УМОВАХ ВОЄННОГО СТАНУ

26. ЗАГРОЗИ ОБ'ЄКТАМ КРИТИЧНОЇ ІНФРАСТРУКТУРИ УКРАЇНИ В УМОВАХ ВОЄННОГО СТАНУ

27. ПРОБЛЕМА ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ В КІБЕРПРОСТОРІ

28. КІБЕРБЕЗПЕКА В УМОВАХ СУЧАСНИХ ЗАГРОЗ: ІЗРАЇЛЬСЬКИЙ ДОСВІД І ЙОГО ЗАСТОСУВАННЯ В УКРАЇНІ

29. Adaptive epsilon greedy reinforcement learning method in securing IoT devices in edge computing.

30. ПЕРСПЕКТИВИ І ВИКЛИКИ ДЛЯ ПАРЛАМЕНТАРИЗМУ В УМОВАХ РОЗВИТКУ ЦИФРОВОГО КОНСТИТУЦІОНАЛІЗМУ.

31. Investigation and analysis of demand response approaches, bottlenecks, and future potential capabilities for IoT‐enabled smart grid.

32. SPM: estimating payload locations of QIM-based steganography in low-bit-rate compressed speeches.

33. ChessCrypt: enhancing wireless communication security in smart cities through dynamically generated S-Box with chess-based nonlinearity.

34. Fusion of machine learning and blockchain-based privacy-preserving approach for healthcare data in the Internet of Things.

35. HARNESSING BLOCKCHAIN WITH ENSEMBLE DEEP LEARNING-BASED DISTRIBUTED DOS ATTACK DETECTION IN IOT-ASSISTED SECURE CONSUMER ELECTRONICS SYSTEMS.

36. A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things.

37. ПРАВОВЕ РЕГУЛЮВАННЯ ЗАХИСТУ НАСЕЛЕННЯ ПРИ РАДІАЦІЙНИХ НАДЗВИЧАЙНИХ СИТУАЦІЯХ НА АТОМНИХ СТАНЦІЯХ В УМОВАХ ВОЄННОГО СТАНУ.

38. Fear over facts: how preconceptions explain perceptions of threat following cyberattacks.

39. Reinforcing cybersecurity with Bloom filters: a novel approach to password cracking efficiency.

40. Harden-IoT: hardening the EoL devices by intercepting the attack vector for future B5G/6G IoT.

41. Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi‐tiered approach.

42. Blockchain‐based decentralized oracle network framework for identity management in metaverse environment.

43. Shaken to the core: trust trajectories in the aftermaths of adverse cyber events.

44. Consensus-Based Power System State Estimation Algorithm Under Collaborative Attack.

45. The evolution of EU–US cybersecurity law and policy: on drivers of convergence.

46. A machine learning-based ensemble model for securing the IoT network.

47. A network intrusion detection system based on deep learning in the IoT.

48. Asynchronous fault detection filtering for nonhomogeneous Markov jump systems with dynamic quantization subject to a novel hybrid cyber attacks.

49. A lightweight and secure authentication protocol for visually impaired and handicapped people in the telehealth system.

50. Class imbalanced data handling with cyberattack classification using Hybrid Salp Swarm Algorithm with deep learning approach.

Catalog

Books, media, physical & digital resources