-
21
Russia vs America cyber war: space technology mastery competition
Published 2024-10-01Subjects: “…russia, as, nato, cyber warfare, space technology hegemony, great power politics, cyber attack…”
Get full text
Article -
22
Cyber-security governance framework pillars for Zimbabwean local authorities
Published 2025-12-01Subjects: “…Cyber-security…”
Get full text
Article -
23
Partisipasi Politik Masyarakat di Era Politik Siber
Published 2021-07-01Subjects: “…cyber…”
Get full text
Article -
24
Study on designation of cyber information assurance education in USA
Published 2016-01-01Subjects: “…cyber security…”
Get full text
Article -
25
Analysis of the situation and problem on the legislation of cyberspace in China
Published 2015-12-01Subjects: Get full text
Article -
26
Ensuring the Security of the Educational Environment: Cases of US, Russia and Europe
Published 2015-08-01Subjects: Get full text
Article -
27
Cyber Security of the Economy and Public Finances: Historiography and Post-War Trajectory of Development
Published 2024-06-01Subjects: “…cyber threats…”
Get full text
Article -
28
Między przeszłością a przyszłością, Polską i Japonią: heterotopie „Avalonu”
Published 2012-12-01Subjects: “…cyber-punk…”
Get full text
Article -
29
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01Subjects: Get full text
Article -
30
Discussions on the talent cultivation of cyber security
Published 2016-02-01Subjects: “…cyber security…”
Get full text
Article -
31
-
32
Suggestions on cyber security talents cultivation
Published 2015-12-01Subjects: “…cyber security…”
Get full text
Article -
33
Quantum information course for the undergraduate students of cyber security
Published 2019-06-01Subjects: Get full text
Article -
34
The Urgency of Cybercrime Law Reform in Indonesia: Resolving Artificial Intelligence Criminal Liability
Published 2024-12-01Subjects: “…cyber crime…”
Get full text
Article -
35
PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
Published 2024-05-01Subjects: Get full text
Article -
36
Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems
Published 2025-01-01Subjects: “…Cyber-physical systems…”
Get full text
Article -
37
A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques
Published 2024-12-01Subjects: Get full text
Article -
38
The Effect of Cyber-Ostracism on Social Anxiety Among Undergraduates: The Mediating Effects of Rejection Sensitivity and Rumination
Published 2025-01-01Subjects: “…cyber-ostracism…”
Get full text
Article -
39
CYBER-PHENOMENOLOGY'S VERSION OF NFT MARKETING STRATEGY
Published 2024-12-01Subjects: Get full text
Article -
40
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01Subjects: “…cyber terrorism…”
Get full text
Article