-
21
The Paradox of Cyber Warfare and Clausewitz’s Conception of War
Published 2025-01-01Subjects: Get full text
Article -
22
PROBLEMS OF DIGITAL TRANSFORMATION OF UKRAINIAN CORPORATE MEDIA
Published 2024-12-01Subjects: Get full text
Article -
23
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
Published 2024-06-01Subjects: Get full text
Article -
24
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: Get full text
Article -
25
Discussion on the cultivation of cyber security talents
Published 2019-06-01Subjects: “…cyber security…”
Get full text
Article -
26
Exploring the talent training mode of“cybersecurity doctor”
Published 2019-06-01Subjects: Get full text
Article -
27
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01Subjects: “…Cyber Security…”
Get full text
Article -
28
Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud
Published 2023-06-01Subjects: Get full text
Article -
29
Lightweight malicious domain name detection model based on separable convolution
Published 2020-12-01Subjects: Get full text
Article -
30
Suggestions on cyber security talents cultivation
Published 2016-03-01Subjects: “…cyber security…”
Get full text
Article -
31
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025-01-01Subjects: Get full text
Article -
32
DCWM-LSTM: A Novel Attack Detection Framework for Robotic Arms
Published 2025-01-01Subjects: Get full text
Article -
33
INTERNET COMMUNICATION: NEW CHALLENGES FOR THE YOUTH
Published 2013-10-01Subjects: Get full text
Article -
34
Discuss on cultivating mode of information security and law inter-disciplinary talents
Published 2019-06-01Subjects: “…talents of cyber security…”
Get full text
Article -
35
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
Published 2024-12-01Subjects: Get full text
Article -
36
Security risk analysis of power 5G hybrid networking
Published 2022-01-01Subjects: Get full text
Article -
37
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01Subjects: Get full text
Article -
38
Cyber security laws and safety in e-commerce in India
Published 2023-06-01Subjects: Get full text
Article -
39
Cyber Physical Security of Distributed Energy Resources
Published 2023-12-01Subjects: Get full text
Article -
40