-
121
THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE
Published 2024-05-01Subjects: Get full text
Article -
122
Fractionated robotic radiosurgery for unfavorable nonfunctioning pituitary macroadenoma: 5-year outcomes from a single institution protocol
Published 2025-02-01Subjects: Get full text
Article -
123
D’une conception informée par des données à la généralisation des systèmes cyber-physiques
Published 2018-12-01Subjects: Get full text
Article -
124
Tight coupling approach for networked control systems from cyber physical system perspective
Published 2015-02-01Subjects: Get full text
Article -
125
Evaluation of the Cyber-Physical System State Under Destructive Impact Conditions Based on a Comprehensive Analysis of Parameters
Published 2025-01-01Subjects: Get full text
Article -
126
Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions)
Published 2023-03-01Subjects: Get full text
Article -
127
Cyber Diplomacy under Increased Competition Between the Great Powers
Published 2024-09-01Subjects: Get full text
Article -
128
Empowering Security Operation Center With Artificial Intelligence and Machine Learning—A Systematic Literature Review
Published 2025-01-01Subjects: Get full text
Article -
129
Survey of modeling methods in cyber-physical system
Published 2016-05-01Subjects: “…cyber-physical system…”
Get full text
Article -
130
Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems
Published 2023-03-01Subjects: Get full text
Article -
131
Application of the Gordon Loeb model to security investment metrics: a proposal
Published 2024-12-01Subjects: “…cyber risk…”
Get full text
Article -
132
Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks
Published 2025-02-01Subjects: “…Cyber-security…”
Get full text
Article -
133
AI-Based Holistic Framework for Cyber Threat Intelligence Management
Published 2025-01-01Subjects: Get full text
Article -
134
ImagTIDS: an internet of things intrusion detection framework utilizing GADF imaging encoding and improved Transformer
Published 2024-12-01Subjects: Get full text
Article -
135
Method to generate cyber deception traffic based on adversarial sample
Published 2020-09-01Subjects: Get full text
Article -
136
Cyber Insurance Adoption and Digitalisation in Small and Medium-Sized Enterprises
Published 2025-01-01Subjects: Get full text
Article -
137
Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel Orchestration
Published 2025-01-01Subjects: “…Cyber-physical systems…”
Get full text
Article -
138
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
Published 2025-01-01Subjects: “…cyber security…”
Get full text
Article -
139
Digitalization of business increases the costs of information security
Published 2020-04-01Subjects: Get full text
Article -
140
A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
Published 2024-12-01Subjects: “…cyber attacks…”
Get full text
Article