-
21
DCWM-LSTM: A Novel Attack Detection Framework for Robotic Arms
Published 2025-01-01Subjects: Get full text
Article -
22
INTERNET COMMUNICATION: NEW CHALLENGES FOR THE YOUTH
Published 2013-10-01Subjects: Get full text
Article -
23
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
Published 2024-12-01Subjects: Get full text
Article -
24
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01Subjects: Get full text
Article -
25
Unveiling personalized and gamification-based cybersecurity risks within financial institutions
Published 2025-02-01Subjects: Get full text
Article -
26
Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions)
Published 2023-03-01Subjects: Get full text
Article -
27
Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks
Published 2025-02-01Subjects: “…Cyber-security…”
Get full text
Article -
28
ImagTIDS: an internet of things intrusion detection framework utilizing GADF imaging encoding and improved Transformer
Published 2024-12-01Subjects: Get full text
Article -
29
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
Published 2025-01-01Subjects: “…cyber security…”
Get full text
Article -
30
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
31
Management of calls and threats in digital economy of Russia
Published 2018-06-01Subjects: Get full text
Article -
32
Power Quality Assessment and Optimization in FUZZY-Driven Healthcare Devices
Published 2025-01-01Subjects: Get full text
Article -
33
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01Subjects: Get full text
Article -
34
Privacy-preserving attribute-based access control using homomorphic encryption
Published 2025-01-01Subjects: Get full text
Article -
35
Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations
Published 2024-12-01Subjects: Get full text
Article -
36
Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Published 2025-01-01Subjects: Get full text
Article -
37
“Simplifying” Digital Complexity? A Socio-Technical Perspective. Editorial Introduction to Issue 33 of CSIMQ
Published 2022-12-01Subjects: Get full text
Article -
38
U.S. – RUSSIA RELATIONS AND ARMS CONTROL: BREATING THE CLINCH
Published 2017-11-01Subjects: Get full text
Article -
39
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article -
40
Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles
Published 2020-01-01“…According to the UK CAV Cyber Security Principles, preventing CAVs from cyber security attacks need to be considered at the beginning of CAV development. …”
Get full text
Article