-
41
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Published 2025-01-01Subjects: Get full text
Article -
42
Research progress of abnormal user detection technology in social network
Published 2018-03-01Subjects: Get full text
Article -
43
A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks
Published 2024-11-01Subjects: Get full text
Article -
44
Research on cyberspace security situation awareness
Published 2016-10-01Subjects: “…cyber security…”
Get full text
Article -
45
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01Subjects: “…Cyber-physical system…”
Get full text
Article -
46
CYBERBULLYING AS A NEW FORM OF DANGER OF THE PSYCHOLOGICAL HEALTH OF A TEENAGER’S PERSONALITY
Published 2018-02-01Subjects: Get full text
Article -
47
Accelerated traffic replay method based on time compression
Published 2021-10-01Subjects: “…cyber security…”
Get full text
Article -
48
CYBERCRIME IN RUSSIA: CURRENT CHALLENGES AND GOOD PRACTICES IN COMBATING CYBERCRIME
Published 2022-04-01Subjects: Get full text
Article -
49
Cancelled: Effect of Cyber-Ostracism on the Mental Condition of Instagram Users
Published 2023-07-01Subjects: “…instagram, basic needs, cyber-ostracism, mood, trait mindfulness…”
Get full text
Article -
50
Security and Privacy in Metaverse: A Comprehensive Survey
Published 2023-06-01Subjects: Get full text
Article -
51
Personal Peacefulness and Cyber-Bystanding of Internet Users in Indonesia
Published 2024-06-01Subjects: Get full text
Article -
52
Fusion of Focal Loss’s cyber threat intelligence entity extraction
Published 2022-07-01Subjects: “…cyber security…”
Get full text
Article -
53
-
54
-
55
Toward Semantic Event-Handling for Building Explainable Cyber-Physical Systems
Published 2024-01-01Subjects: “…Cyber-physical systems (CPSs)…”
Get full text
Article -
56
Cyber security and need to change the model of monitoring fraud and financial crime
Published 2020-01-01Subjects: Get full text
Article -
57
APPLICATION OF TRADITIONALTHEORIES IN THE AGE OF CYBER COMMUNICATION
Published 2024-06-01Subjects: Get full text
Article -
58
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Published 2025-01-01Subjects: Get full text
Article -
59
High resistance botnet based on smart contract
Published 2021-08-01Subjects: “…cyber security…”
Get full text
Article -
60
Research on active defense application based on honeypot
Published 2018-01-01Subjects: “…cyber security…”
Get full text
Article