-
81
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025-01-01Subjects: Get full text
Article -
82
Cyber-bioethics: the new ethical discipline for digital health
Published 2025-01-01Subjects: Get full text
Article -
83
Cyberbullying in Kenyan universities: Lessons and insights from the personal experience of deans of students
Published 2024-07-01Subjects: “…cyber-bullying…”
Get full text
Article -
84
DCWM-LSTM: A Novel Attack Detection Framework for Robotic Arms
Published 2025-01-01Subjects: Get full text
Article -
85
THREATS TO BUSINESS ACCOUNTING DATA IN THE DIGITAL AGE
Published 2024-12-01Subjects: Get full text
Article -
86
Cyber-activism and Waves of Communication Agitation: Ethnographic Considerations
Published 2017-09-01Subjects: “…Cyber-activism…”
Get full text
Article -
87
Le rôle des initiatives privées dans le développement des TIC à Ziguinchor
Published 2008-06-01Subjects: Get full text
Article -
88
A novel approach for graph-based real-time anomaly detection from dynamic network data listened by Wireshark
Published 2025-01-01Subjects: “…Cyber Attacks…”
Get full text
Article -
89
Moral disengagement as mediator and guilt as moderator between cyber moral literacy and cyberbullying among late adolescents
Published 2025-01-01Subjects: “…Cyber moral literacy…”
Get full text
Article -
90
Discuss on cultivating mode of information security and law inter-disciplinary talents
Published 2019-06-01Subjects: “…talents of cyber security…”
Get full text
Article -
91
Digital Membership and Activist Strategies in Spanish Non-Statewide Parties
Published 2024-12-01Subjects: Get full text
Article -
92
Security risk analysis of power 5G hybrid networking
Published 2022-01-01Subjects: Get full text
Article -
93
Moving target defense against network eavesdropping attack using POF
Published 2018-02-01Subjects: Get full text
Article -
94
Predictors, prevalence, and patterns of cyberbullying among school-going children and adolescents
Published 2023-07-01Subjects: Get full text
Article -
95
Research and design of hybrid scheduling system of node operating system for cyber physical systems
Published 2013-12-01Subjects: “…cyber physical systems…”
Get full text
Article -
96
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01Subjects: Get full text
Article -
97
A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture
Published 2025-01-01Subjects: Get full text
Article -
98
A systematic literature review and taxonomy proposition of machine learning techniques in smart manufacturing
Published 2023-12-01Subjects: Get full text
Article -
99
Work from home can be distracting: Exploring the moderation role of transformational leadership on teleworking and cyber-slacking
Published 2025-12-01Subjects: Get full text
Article -
100
WOMEN’S RECEPTION OF CYBER CHURCHES DURING THE PANDEMIC AND INDICATIONS FOR THE FUTURE
Published 2023-04-01Subjects: “…Cyber church…”
Get full text
Article