-
41
PROBLEMS OF DIGITAL TRANSFORMATION OF UKRAINIAN CORPORATE MEDIA
Published 2024-12-01Subjects: Get full text
Article -
42
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: Get full text
Article -
43
Exploring the talent training mode of“cybersecurity doctor”
Published 2019-06-01Subjects: Get full text
Article -
44
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01Subjects: “…Cyber Security…”
Get full text
Article -
45
Lightweight malicious domain name detection model based on separable convolution
Published 2020-12-01Subjects: Get full text
Article -
46
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025-01-01Subjects: Get full text
Article -
47
DCWM-LSTM: A Novel Attack Detection Framework for Robotic Arms
Published 2025-01-01Subjects: Get full text
Article -
48
INTERNET COMMUNICATION: NEW CHALLENGES FOR THE YOUTH
Published 2013-10-01Subjects: Get full text
Article -
49
Discuss on cultivating mode of information security and law inter-disciplinary talents
Published 2019-06-01Subjects: “…talents of cyber security…”
Get full text
Article -
50
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
Published 2024-12-01Subjects: Get full text
Article -
51
Security risk analysis of power 5G hybrid networking
Published 2022-01-01Subjects: Get full text
Article -
52
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01Subjects: Get full text
Article -
53
Cyber Physical Security of Distributed Energy Resources
Published 2023-12-01Subjects: Get full text
Article -
54
-
55
Unveiling personalized and gamification-based cybersecurity risks within financial institutions
Published 2025-02-01Subjects: Get full text
Article -
56
Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions)
Published 2023-03-01Subjects: Get full text
Article -
57
Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems
Published 2023-03-01Subjects: Get full text
Article -
58
Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks
Published 2025-02-01Subjects: “…Cyber-security…”
Get full text
Article -
59
ImagTIDS: an internet of things intrusion detection framework utilizing GADF imaging encoding and improved Transformer
Published 2024-12-01Subjects: Get full text
Article -
60
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
Published 2025-01-01Subjects: “…cyber security…”
Get full text
Article