-
81
Social Network Community-Discovery Algorithm Based on a Balance Factor
Published 2022-01-01Get full text
Article -
82
Determinants of digital bank transformation: a systematic literature review with prisma and bibliometrics
Published 2024-11-01“…The determinants in the digital bank transformation process include the level of digitalization, application user growth, IT investment, IT committee, cyber security, and ecosystem stocks. The results of this literature review will be a reference for further research related to digital banks, in line with the rapid digital transformation process in banking.…”
Get full text
Article -
83
Weibo Rumor Recognition Based on Communication and Stacking Ensemble Learning
Published 2020-01-01Get full text
Article -
84
Reversible data hiding scheme based on pixel-value differencing in dual images
Published 2020-07-01Get full text
Article -
85
A Torus-Chaotic System and Its Pseudorandom Properties
Published 2020-01-01“…Furthermore, the pseudorandom properties of output sequence are well studied and a random number generator algorithm is proposed, which has the potential of being used in several cyber security systems such as the verification code, secure QR code, and some secure communication protocols.…”
Get full text
Article -
86
-
87
Enhancing cybersecurity incident response: AI-driven optimization for strengthened advanced persistent threat detection
Published 2025-03-01“…The Cyber Security Incident Response Team executes its critical duties in the Centralized Security Operation Centers. …”
Get full text
Article -
88
Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems
Published 2025-01-01“…This paper focuses on cyber-security issues of networked control systems in closed-loop forms from the perspective of quantized sampled-data systems. …”
Get full text
Article -
89
Evaluating network test scenarios for network simulators systems
Published 2017-10-01Get full text
Article -
90
Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model
Published 2021-01-01“…Despite the growing popularity of machine learning models in the cyber-security applications (e.g., an intrusion detection system (IDS)), most of these models are perceived as a black-box. …”
Get full text
Article -
91
AI-based model for securing cognitive IoT devices in advance communication systems
Published 2025-12-01Get full text
Article -
92
A Resilience-Based Security Assessment Approach for CBTC Systems
Published 2021-01-01“…The CBTC system ensures safe and efficient operation of trains, so the quantitative assessment of cyber security is quite necessary. In this paper, a resilience-based assessment method is proposed to analyze the security level of CBTC systems based on indicators of both the cyber domain and the physical domain. …”
Get full text
Article -
93
Hybrid Botnet Detection Based on Host and Network Analysis
Published 2020-01-01“…Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. …”
Get full text
Article -
94
Quantum algorithms for enhanced educational technologies
Published 2025-01-01“…Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
Get full text
Article -
95
Transformation of business under the influence of artificial intelligence
Published 2024-01-01“…Research results of Forbes Advisor (2023) indicate that the most common use of AI is in Customer Service, Cyber Security, Digital Personal Assistants, Customer Relationship Management (CRM), etc. …”
Get full text
Article -
96
Development of the national cybersecurity system of Ukraine as a necessary element of information society development
Published 2021-12-01“…Attention is drawn to the unconditional fulfillment of the tasks of the new Cyber Security Strategy of Ukraine, especially those related to cyber protection of critical infrastructure. …”
Get full text
Article -
97
A Program for Master of Information Technology
Published 2022“…The core courses in this programmes address challenges related to Enterprise Governance of ICT, Managing ICT Projects, Risk & Change Management, Cyber Security Management, IT project Management among others. …”
Get full text
Other -
98
E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review
Published 2024-06-01“…To establish a healthy e-commerce ecosystem, robust cyber security and anti-fraud measures are crucial. However, research on fraud detection systems has struggled to keep pace due to limited real-world datasets. …”
Get full text
Article -
99
WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches
Published 2024-12-01“…The rise in cyber security issues has caused significant harm to tech world and thus society in recent years. …”
Get full text
Article -
100