-
161
End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT
Published 2025-01-01Subjects: Get full text
Article -
162
Evaluation method for autonomous communication and networking capability of UAV
Published 2020-08-01Subjects: Get full text
Article -
163
Bibliometric Mapping of Scientific Production and Conceptual Structure of Cyber Sextortion in Cybersecurity
Published 2024-12-01Subjects: “…cyber sextortion…”
Get full text
Article -
164
-
165
Power Quality Assessment and Optimization in FUZZY-Driven Healthcare Devices
Published 2025-01-01Subjects: Get full text
Article -
166
Literatură epistolară îmblânzită sau nu de tehnologie
Published 2011-12-01Subjects: Get full text
Article -
167
Privacy-preserving attribute-based access control using homomorphic encryption
Published 2025-01-01Subjects: Get full text
Article -
168
Cascaded intrusion detection system using machine learning
Published 2025-12-01Subjects: “…Cyber-crime…”
Get full text
Article -
169
A semi-synchronous federated learning framework with chaos-based encryption for enhanced security in medical image sharing
Published 2025-03-01Subjects: Get full text
Article -
170
A Survey on Algorithms for Intelligent Computing and Smart City Applications
Published 2021-09-01Subjects: “…cyber physical systems…”
Get full text
Article -
171
Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud
Published 2024-12-01Subjects: Get full text
Article -
172
Is digital crime victimization increasing in Iceland – may the Me-too movement influence how victimization is experienced
Published 2020-04-01Subjects: Get full text
Article -
173
Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations
Published 2024-12-01Subjects: Get full text
Article -
174
Digital Twin’s Anatomy: A Cross-Sector Framework With Healthcare Validation
Published 2025-01-01Subjects: Get full text
Article -
175
INNOVATIVE-TECHNOLOGICAL PRODUCTION DEVELOPMENT ON THE BASIS INTELLECTUALIZATION OF PROCESSES. FOREIGN EXPERIENCE
Published 2017-12-01Subjects: Get full text
Article -
176
Protecting digital assets using an ontology based cyber situational awareness system
Published 2025-01-01Subjects: Get full text
Article -
177
Analysis of cyber incidents in Senegal from 2005 to 2023
Published 2024-12-01Subjects: “…cybersecurity, cyber incidents, cyberattacks, cybercrimes, compromised websites, data exposure, denial-of-service (DoS), ransomware, Senegal…”
Get full text
Article -
178
-
179
Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms
Published 2024-09-01Subjects: Get full text
Article -
180
Digital economy and education in China: globalisation and cyber sovereignty
Published 2024-04-01Subjects: Get full text
Article