-
21
Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems
Published 2025-01-01Subjects: “…Cyber-physical systems…”
Get full text
Article -
22
A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques
Published 2024-12-01Subjects: Get full text
Article -
23
The Effect of Cyber-Ostracism on Social Anxiety Among Undergraduates: The Mediating Effects of Rejection Sensitivity and Rumination
Published 2025-01-01Subjects: “…cyber-ostracism…”
Get full text
Article -
24
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01Subjects: “…cyber terrorism…”
Get full text
Article -
25
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01Subjects: “…Cyber-physical system…”
Get full text
Article -
26
CYBERBULLYING AS A NEW FORM OF DANGER OF THE PSYCHOLOGICAL HEALTH OF A TEENAGER’S PERSONALITY
Published 2018-02-01Subjects: Get full text
Article -
27
Cancelled: Effect of Cyber-Ostracism on the Mental Condition of Instagram Users
Published 2023-07-01Subjects: “…instagram, basic needs, cyber-ostracism, mood, trait mindfulness…”
Get full text
Article -
28
Security and Privacy in Metaverse: A Comprehensive Survey
Published 2023-06-01Subjects: Get full text
Article -
29
-
30
-
31
Cyber security and need to change the model of monitoring fraud and financial crime
Published 2020-01-01Subjects: Get full text
Article -
32
APPLICATION OF TRADITIONALTHEORIES IN THE AGE OF CYBER COMMUNICATION
Published 2024-06-01Subjects: Get full text
Article -
33
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Published 2025-01-01Subjects: Get full text
Article -
34
Social Engineering Analysis Framework: A Comprehensive Playbook for Human Hacking
Published 2025-01-01Subjects: Get full text
Article -
35
Improving the information security sustainability of the economy financial sector
Published 2023-06-01Subjects: Get full text
Article -
36
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: Get full text
Article -
37
Anxiety and Self-esteem as Causes and Consequences of Cyber-victimization in Preadolescence: A Longitudinal Study
Published 2025-01-01Subjects: Get full text
Article -
38
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01Subjects: “…Cyber Security…”
Get full text
Article -
39
Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
Published 2024-11-01Subjects: Get full text
Article -
40
Deep learning for cyber threat detection in IoT networks: A review
Published 2024-01-01Subjects: “…Cyber threats…”
Get full text
Article