-
41
Unveiling personalized and gamification-based cybersecurity risks within financial institutions
Published 2025-02-01Subjects: Get full text
Article -
42
THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE
Published 2024-05-01Subjects: Get full text
Article -
43
Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions)
Published 2023-03-01Subjects: Get full text
Article -
44
Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems
Published 2023-03-01Subjects: Get full text
Article -
45
Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks
Published 2025-02-01Subjects: “…Cyber-security…”
Get full text
Article -
46
ImagTIDS: an internet of things intrusion detection framework utilizing GADF imaging encoding and improved Transformer
Published 2024-12-01Subjects: Get full text
Article -
47
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
Published 2025-01-01Subjects: “…cyber security…”
Get full text
Article -
48
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
49
Trends, challenges and solutions of digital information security in Central and Eastern Europe
Published 2024-06-01Subjects: Get full text
Article -
50
Management of calls and threats in digital economy of Russia
Published 2018-06-01Subjects: Get full text
Article -
51
SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments
Published 2025-01-01Subjects: Get full text
Article -
52
Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review
Published 2025-01-01Subjects: “…cyber security…”
Get full text
Article -
53
IoT Network Anomaly Detection in Smart Homes Using Machine Learning
Published 2023-01-01Subjects: Get full text
Article -
54
Power Quality Assessment and Optimization in FUZZY-Driven Healthcare Devices
Published 2025-01-01Subjects: Get full text
Article -
55
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01Subjects: Get full text
Article -
56
Privacy-preserving attribute-based access control using homomorphic encryption
Published 2025-01-01Subjects: Get full text
Article -
57
Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations
Published 2024-12-01Subjects: Get full text
Article -
58
Cyber Security of the Economy and Public Finances: Historiography and Post-War Trajectory of Development
Published 2024-06-01Subjects: Get full text
Article -
59
Host security threat analysis approach for network dynamic defense
Published 2018-04-01Subjects: “…cyber security…”
Get full text
Article -
60
Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Published 2025-01-01Subjects: Get full text
Article