-
1
-
2
ТЕНДЕНЦІЇ РОЗВИТКУ КІБЕРЗАГРОЗ У СВІТОВОМУ ІНФОРМАЦІЙНОМУ ПРОСТОРІ
Published 2015-01-01Subjects: “…cyber threats…”
Get full text
Article -
3
The pivotal role of software defined networks to safeguard against cyber attacks: a comprehensive review
Published 2025-04-01Subjects: Get full text
Article -
4
DAI-TIRS: An AI-Powered Threat Intelligence and Response System for Securing the Metaverse
Published 2025-08-01Subjects: Get full text
Article -
5
Cyber Warfare and National Security
Published 2025-01-01Subjects: “…Cyber threats…”
Get full text
Article -
6
Explanatory Data Science in Technology Applications
Published 2025-08-01Subjects: “…AI-Driven Cyber Threats…”
Get full text
Article -
7
Analysis of modern types of cyberterrorism and methods of countering them
Published 2024-10-01Subjects: “…cyber threats…”
Get full text
Article -
8
Reasons for the increase in cyber attacks: analysis of technical and non-technical factors
Published 2023-11-01Subjects: Get full text
Article -
9
MODIFICAREA PEISAJULUI AMENINȚĂRILOR CIBERNETICE DATORITĂ IMPLICĂRII GRUPĂRILOR DE CYBERCRIME ÎN RĂZBOIUL RUSO-UCRAINEAN
Published 2023-01-01Subjects: Get full text
Article -
10
Cybersecurity in Higher Education: Challenges and Measures for Information Storage
Published 2025-12-01Subjects: Get full text
Article -
11
Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review
Published 2025-03-01Subjects: Get full text
Article -
12
A Systematic Literature Review on Tackling Cyber Threats for Cyber Logistic Chain and Conceptual Frameworks for Robust Detection Mechanisms
Published 2025-01-01Subjects: Get full text
Article -
13
Application of modern technologies to ensure operational reliability and safety in energy systems of Azerbaijan
Published 2024-01-01Subjects: Get full text
Article -
14
Problems of Russia's Cyber-Security in the Arctic
Published 2020-05-01Subjects: Get full text
Article -
15
SIMULATION OF PERIPHERAL DEVICE SECURITY: IMPLEMENTATION AND PRACTICAL EVLUATION OF ADDRESS SPACES PROTECTION IN A TRUSTED MICROPROCESSOR EMULATOR
Published 2025-07-01Subjects: “…iommu, instruction set simulator, architectural modeling, pagewalk, countering cyber threats.…”
Get full text
Article -
16
Toward a Unified Understanding of Cyber Resilience: Concepts, Strategies, and Future Directions
Published 2025-01-01Subjects: Get full text
Article -
17
ENHANCING CYBERSECURITY THROUGH MALWARE DETECTION BASED ON MACHINE LEARNING TECHNIQUE
Published 2025-07-01Subjects: Get full text
Article -
18
Various types of cyber threats
Published 2024-01-01Subjects: “…cyber threats…”
Get full text
Article -
19
Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet)
Published 2025-02-01Subjects: Get full text
Article -
20