-
21
Cyber security entity recognition method based on residual dilation convolution neural network
Published 2020-10-01Get full text
Article -
22
Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college
Published 2019-06-01“…Cyberspace security is a matter of national security,and the talent cultivation is of top priority.Based on the experience of developing the first-class cyber security college of Beihang University,this paper analyzes some common issues,and discusses the ideas,mechanisms and patterns of cyberspace security talents cultivation from the aspects of the talents selection,curriculum system,comprehensive training platform,practical training and academic competitions.It may provide a reference for the training of cyber security professionals.…”
Get full text
Article -
23
Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review
Published 2025-01-01Subjects: “…cyber security…”
Get full text
Article -
24
Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud
Published 2023-06-01Subjects: Get full text
Article -
25
Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province
Published 2021-04-01“…Facing the opportunities and challenges in developing the cultivation of cyber security talents in the new security situation, a questionnaire survey on the undergraduate colleges of Jiangsu province, offering network security related majors, is conducted first.Next, multidimensional analysis and comparative study involve eight aspects, such as the distribution scale, the cultivation level, and the curriculum system.Finally, explorations on four aspects, including guarantees of politics, the teaching staff, society, and funds, lead to effective paths on the cultivation of cyber security talents for Jiangsu province under the environment of double tops.…”
Get full text
Article -
26
APPLICATION OF ARTIFICIAL INTELLIGENCE FOR IMPROVING SITUATIONAL TRAINING OF CYBERSECURITY SPECIALISTS
Published 2023-10-01Subjects: Get full text
Article -
27
Study on designation of cyber information assurance education in USA
Published 2016-01-01Subjects: “…cyber security…”
Get full text
Article -
28
-
29
A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques
Published 2024-12-01Subjects: Get full text
Article -
30
Research progress of abnormal user detection technology in social network
Published 2018-03-01Subjects: Get full text
Article -
31
A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks
Published 2024-11-01Subjects: Get full text
Article -
32
Research on cyberspace security situation awareness
Published 2016-10-01Subjects: “…cyber security…”
Get full text
Article -
33
Accelerated traffic replay method based on time compression
Published 2021-10-01Subjects: “…cyber security…”
Get full text
Article -
34
CYBERCRIME IN RUSSIA: CURRENT CHALLENGES AND GOOD PRACTICES IN COMBATING CYBERCRIME
Published 2022-04-01Subjects: Get full text
Article -
35
Fusion of Focal Loss’s cyber threat intelligence entity extraction
Published 2022-07-01Subjects: “…cyber security…”
Get full text
Article -
36
Cyber ranges: survey and perspective
Published 2024-10-01Subjects: “…cyber security…”
Get full text
Article -
37
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Published 2025-01-01Subjects: Get full text
Article -
38
High resistance botnet based on smart contract
Published 2021-08-01Subjects: “…cyber security…”
Get full text
Article -
39
Research on active defense application based on honeypot
Published 2018-01-01Subjects: “…cyber security…”
Get full text
Article -
40
The Paradox of Cyber Warfare and Clausewitz’s Conception of War
Published 2025-01-01Subjects: Get full text
Article