-
1
A Systematic Literature Review of Cyber Security Monitoring in Maritime
Published 2025-01-01Subjects: Get full text
Article -
2
ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA
Published 2019-02-01Subjects: “…cyber security…”
Get full text
Article -
3
Evolution,characteristics and revelation of the US cyber-security review system
Published 2019-12-01Subjects: Get full text
Article -
4
Europe’s fragmented approach towards cyber security
Published 2013-10-01Subjects: “…Cyber security…”
Get full text
Article -
5
APPLICATION OF ARTIFICIAL INTELLIGENCE FOR IMPROVING SITUATIONAL TRAINING OF CYBERSECURITY SPECIALISTS
Published 2023-10-01Subjects: Get full text
Article -
6
Cyber-security governance framework pillars for Zimbabwean local authorities
Published 2025-12-01Subjects: “…Cyber-security…”
Get full text
Article -
7
LLMs in Cyber Security: Bridging Practice and Education
Published 2025-07-01Subjects: Get full text
Article -
8
Quantifying the Return of Security Investments for Technology Startups
Published 2024-07-01Subjects: “…Cyber Security Maturity Level, Cyber Security Quantification, Return of Security Investment, ROSI, Technology Startup…”
Get full text
Article -
9
Enhancing investment through cyber security policies – Case of Albania
Published 2020-03-01Subjects: “…cyber security strategy…”
Get full text
Article -
10
SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity
Published 2024-01-01Subjects: Get full text
Article -
11
СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ
Published 2015-12-01Subjects: “…cyber security…”
Get full text
Article -
12
Accountability challenges confronting cyberspace governance
Published 2017-09-01Subjects: “…Cyber security…”
Get full text
Article -
13
Kurumsal Siber Güvenliğe Yönelik Tehditler ve Önlemleri
Published 2015-03-01Subjects: Get full text
Article -
14
Kurumsal Siber Güvenliğe Yönelik Tehditler ve Önlemleri
Published 2015-03-01Subjects: Get full text
Article -
15
Kurumsal Siber Güvenliğe Yönelik Tehditler ve Önlemleri
Published 2015-03-01Subjects: Get full text
Article -
16
Design and Build an Assessment Platform by Inserting Moodle-Based Cryptographic Methods
Published 2024-01-01Subjects: “…Cyber Security…”
Get full text
Article -
17
Discussions on the talent cultivation of cyber security
Published 2016-02-01Subjects: “…cyber security…”
Get full text
Article -
18
Enhanced anomaly traffic detection framework using BiGAN and contrastive learning
Published 2024-11-01Subjects: “…Cyber security…”
Get full text
Article -
19
A scoping study: crime and connected and autonomous vehicles
Published 2025-03-01Subjects: Get full text
Article -
20
Quantum information course for the undergraduate students of cyber security
Published 2019-06-01Subjects: Get full text
Article