-
41
Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
Published 2025-01-01Subjects: Get full text
Article -
42
Knowledge triple extraction in cybersecurity with adversarial active learning
Published 2020-10-01Subjects: Get full text
Article -
43
Cybersecurity enhancement in the field of eHealth system development in Ukraine
Published 2024-12-01Subjects: Get full text
Article -
44
Systematic Literature Review of Machine Learning Models for Detecting DDoS Attacks in IoT Networks
Published 2024-12-01Subjects: Get full text
Article -
45
Development of the national cybersecurity system of Ukraine as a necessary element of information society development
Published 2021-12-01Subjects: “…cybersecurity…”
Get full text
Article -
46
Cybercrime as Threat of National Security of Russia
Published 2022-07-01Subjects: Get full text
Article -
47
CoAt-Set: Transformed coordinated attack dataset for collaborative intrusion detection simulationMendeley Data
Published 2025-04-01Subjects: “…Cybersecurity…”
Get full text
Article -
48
Enhancing cybersecurity incident response: AI-driven optimization for strengthened advanced persistent threat detection
Published 2025-03-01Subjects: “…Cybersecurity incident response…”
Get full text
Article -
49
A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure
Published 2025-01-01Subjects: Get full text
Article -
50
A survey of cybersecurity for intelligent connected-automated vehicle
Published 2020-04-01Subjects: Get full text
Article -
51
Is a Theory of Cyberspace Dominance Possible? An Assessment from the Perspective of China’s Cyber Sovereignty Approach
Published 2024-12-01Subjects: Get full text
Article -
52
Password strength verification based on machine learning algorithms and LSTM recurrent neural networks
Published 2023-08-01Subjects: “…cybersecurity…”
Get full text
Article -
53
Safeguarding Mobile Users from Violation by Third-party Apps
Published 2025-01-01Subjects: “…cia cybersecurity…”
Get full text
Article -
54
A neutrosophic framework for evaluating security measures in information systems
Published 2024-11-01Subjects: “…cybersecurity…”
Get full text
Article -
55
Review of Recent Advances in Predictive Maintenance and Cybersecurity for Solar Plants
Published 2025-01-01Subjects: Get full text
Article -
56
Hybrid dung beetle optimization based dimensionality reduction with deep learning based cybersecurity solution on IoT environment
Published 2025-01-01Subjects: Get full text
Article -
57
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
Published 2025-01-01Subjects: Get full text
Article -
58
A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats
Published 2024-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
59
A Framework for Resilient Community Microgrids: Review of Operational Strategies and Performance Metrics
Published 2025-01-01Subjects: Get full text
Article -
60
STBM: secure and trustworthy blockchain-based model for cybersecurity service transactions
Published 2024-09-01Subjects: “…cybersecurity service…”
Get full text
Article