Showing 81 - 100 results of 120 for search '"cyber security"', query time: 0.06s Refine Results
  1. 81
  2. 82

    Determinants of digital bank transformation: a systematic literature review with prisma and bibliometrics by Wahyu Avianto, Hermanto Siregar, Anny Ratnawati, Mulya E Siregar

    Published 2024-11-01
    “…The determinants in the digital bank transformation process include the level of digitalization, application user growth, IT investment, IT committee, cyber security, and ecosystem stocks. The results of this literature review will be a reference for further research related to digital banks, in line with the rapid digital transformation process in banking.…”
    Get full text
    Article
  3. 83
  4. 84
  5. 85

    A Torus-Chaotic System and Its Pseudorandom Properties by Jizhao Liu, Xiangzi Zhang, Qingchun Zhao, Jing Lian, Fangjun Huang, Yide Ma

    Published 2020-01-01
    “…Furthermore, the pseudorandom properties of output sequence are well studied and a random number generator algorithm is proposed, which has the potential of being used in several cyber security systems such as the verification code, secure QR code, and some secure communication protocols.…”
    Get full text
    Article
  6. 86
  7. 87

    Enhancing cybersecurity incident response: AI-driven optimization for strengthened advanced persistent threat detection by Gauhar Ali, Sajid Shah, Mohammed ElAffendi

    Published 2025-03-01
    “…The Cyber Security Incident Response Team executes its critical duties in the Centralized Security Operation Centers. …”
    Get full text
    Article
  8. 88

    Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems by Xile Kang, Hideaki Ishii

    Published 2025-01-01
    “…This paper focuses on cyber-security issues of networked control systems in closed-loop forms from the perspective of quantized sampled-data systems. …”
    Get full text
    Article
  9. 89
  10. 90

    Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model by Basim Mahbooba, Mohan Timilsina, Radhya Sahal, Martin Serrano

    Published 2021-01-01
    “…Despite the growing popularity of machine learning models in the cyber-security applications (e.g., an intrusion detection system (IDS)), most of these models are perceived as a black-box. …”
    Get full text
    Article
  11. 91
  12. 92

    A Resilience-Based Security Assessment Approach for CBTC Systems by Ruiming Lu, Huiyu Dong, Hongwei Wang, Dongliang Cui, Li Zhu, Xi Wang

    Published 2021-01-01
    “…The CBTC system ensures safe and efficient operation of trains, so the quantitative assessment of cyber security is quite necessary. In this paper, a resilience-based assessment method is proposed to analyze the security level of CBTC systems based on indicators of both the cyber domain and the physical domain. …”
    Get full text
    Article
  13. 93

    Hybrid Botnet Detection Based on Host and Network Analysis by Suzan Almutairi, Saoucene Mahfoudh, Sultan Almutairi, Jalal S. Alowibdi

    Published 2020-01-01
    “…Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. …”
    Get full text
    Article
  14. 94

    Quantum algorithms for enhanced educational technologies by Basil Hanafi, Mohammad Ali, Devyaani Singh

    Published 2025-01-01
    “…Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
    Get full text
    Article
  15. 95

    Transformation of business under the influence of artificial intelligence by Buha Vesna, Lečić Rada, Berezljev Ljiljana

    Published 2024-01-01
    “…Research results of Forbes Advisor (2023) indicate that the most common use of AI is in Customer Service, Cyber Security, Digital Personal Assistants, Customer Relationship Management (CRM), etc. …”
    Get full text
    Article
  16. 96

    Development of the national cybersecurity system of Ukraine as a necessary element of information society development by S. H. Petrov

    Published 2021-12-01
    “…Attention is drawn to the unconditional fulfillment of the tasks of the new Cyber Security Strategy of Ukraine, especially those related to cyber protection of critical infrastructure. …”
    Get full text
    Article
  17. 97

    A Program for Master of Information Technology by Kabale University

    Published 2022
    “…The core courses in this programmes address challenges related to Enterprise Governance of ICT, Managing ICT Projects, Risk & Change Management, Cyber Security Management, IT project Management among others. …”
    Get full text
    Other
  18. 98

    E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review by Abed Mutemi, Fernando Bacao

    Published 2024-06-01
    “…To establish a healthy e-commerce ecosystem, robust cyber security and anti-fraud measures are crucial. However, research on fraud detection systems has struggled to keep pace due to limited real-world datasets. …”
    Get full text
    Article
  19. 99

    WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches by Shehla Gul, Sobia Arshad, Sanay Muhammad Umar Saeed, Adeel Akram, Muhammad Awais Azam

    Published 2024-12-01
    “…The rise in cyber security issues has caused significant harm to tech world and thus society in recent years. …”
    Get full text
    Article
  20. 100