-
21
Workflow for Conflict and Reinforcement Identification Based on STPA and STRIDE
Published 2025-01-01Subjects: Get full text
Article -
22
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01Subjects: Get full text
Article -
23
Cybersecurity Practices and Supply Chain Performance: The Case of Jordanian Banks
Published 2024-12-01Subjects: “…cybersecurity…”
Get full text
Article -
24
Security and Privacy in Metaverse: A Comprehensive Survey
Published 2023-06-01Subjects: Get full text
Article -
25
Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field
Published 2025-01-01Subjects: Get full text
Article -
26
A Novel AI-Based Integrated Cybersecurity Risk Assessment Framework and Resilience of National Critical Infrastructure
Published 2025-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
27
Validation of a scale based on the DigComp framework on internet navigation and cybersecurity in older adults
Published 2025-01-01Subjects: “…cybersecurity…”
Get full text
Article -
28
Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation
Published 2025-01-01Subjects: Get full text
Article -
29
Research on Spurious-Negative Sample Augmentation-Based Quality Evaluation Method for Cybersecurity Knowledge Graph
Published 2024-12-01Subjects: “…cybersecurity…”
Get full text
Article -
30
Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review
Published 2025-01-01Subjects: Get full text
Article -
31
Exploration and practice of PRIDE teaching mode oriented to cybersecurity talent cultivation
Published 2021-08-01Subjects: “…cybersecurity…”
Get full text
Article -
32
Il rapporto tra cybersicurezza e tutela dei dati personali: sinergie, bilanciamenti e parallelismi
Published 2024-07-01Subjects: Get full text
Article -
33
DEVELOPMENT OF IT GOVERNANCE COMPETENCES IN THE BOARD OF DIRECTORS IN A DIGITAL ECONOMY
Published 2018-12-01Subjects: Get full text
Article -
34
Social Engineering Analysis Framework: A Comprehensive Playbook for Human Hacking
Published 2025-01-01Subjects: Get full text
Article -
35
A hybrid model of extended FMEA model based on F-PIPRECIA and Z-EDAS methods with Bow Tie to evaluate cybersecurity risks in Industry 4.0
Published 2024-03-01Subjects: “…cybersecurity…”
Get full text
Article -
36
Improving the information security sustainability of the economy financial sector
Published 2023-06-01Subjects: “…cybersecurity…”
Get full text
Article -
37
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01Subjects: “…Cybersecurity…”
Get full text
Article -
38
Exploring the talent training mode of“cybersecurity doctor”
Published 2019-06-01Subjects: Get full text
Article -
39
A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid
Published 2024-01-01Subjects: Get full text
Article -
40