Showing 101 - 120 results of 120 for search '"cyber security"', query time: 0.08s Refine Results
  1. 101

    Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform by Ka‐Wing Tse, Kevin Hung

    Published 2022-03-01
    “…Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.…”
    Get full text
    Article
  2. 102

    MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME by I. V. Novash

    Published 2017-05-01
    “…Examples are given of the use of RTDS systems by foreign energy companies to test relay protection systems and control, to test the equipment and devices of automatic control, analysis of cyber security and evaluation of the operation of energy systems under different scenarios of occurrence of emergency situations. …”
    Get full text
    Article
  3. 103

    Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering by P. Banerjee, Anurag K. Srivastava, Donald A. Adjeroh, Ramana Reddy, Nima Karimian

    Published 2025-01-01
    “…In this paper, common classroom problems and their respective responses from ChatGPT in the domains of Computer Science, Cyber Security, Data Science, and Electrical Engineering are analyzed to determine the categories of queries for which ChatGPT offers reliable responses and those for which it may be factually incorrect. …”
    Get full text
    Article
  4. 104
  5. 105
  6. 106
  7. 107
  8. 108

    RETRACTED ARTICLE: An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks by Shanthalakshmi M, Ponmagal R S

    Published 2024-09-01
    “…This research contributes to the development of intelligent cyber-security models that align with 6G standards, ultimately supporting the safe and efficient integration of AVs into smart cities.…”
    Get full text
    Article
  9. 109
  10. 110
  11. 111
  12. 112
  13. 113

    Presenting the Model of Effective Factors on Smart Governance in the Country by Ghaem Gheiravani, Mohammad Montazeri, Shams Sadat Zahedi

    Published 2024-06-01
    “…The contextual factor of needs assessment in this research included equipment and infrastructure, required resources, information and communication technology, cyber security, statistics and intelligent information. …”
    Get full text
    Article
  14. 114
  15. 115

    Optimalisasi Strategi Intelijen dalam Menghadapi Ancaman TPPO Jaringan Kamboja dan Implikasinya bagi Keamanan Nasional by Gidion Jhon Putra

    Published 2024-12-01
    “…The intelligence strategy to combat the Cambodian network's human trafficking threats involves cross-sectoral cooperation through early detection and early warning as preventive measures against threats, conducted through investigations and security efforts in collaboration with Ministries, Agencies, and international cooperation with Cambodian authorities to produce memorandums of understanding for prevention, enforcement, protection, and policy harmonization. The cyber security intelligence strategy includes data collection, data analysis, and covert operations, such as wiretapping, cyber patrols, and situational control operations. …”
    Get full text
    Article
  16. 116

    How prepared is Nigeria digital payment for health workers? A landscape analysis by Folashayo Peter Adeniji, David Ayobami Adewole, Segun Bello, Elizabeth Ekirapa, Juliet Aweko, Vincent Michael Kiberu, Charles Opio, Peter Waiswa, Olufunmilayo Ibitola Fawole

    Published 2025-02-01
    “…Challenges of digital payments included: delayed resolution of problems associated with digital payment such as failed transactions, cyber security, double payments, and unfriendly bank policies. …”
    Get full text
    Article
  17. 117
  18. 118
  19. 119

    DEVELOPING INFORMATION AND TECHNOLOGICAL COMPETENCE OF PROSPECTIVE MILITARY SAILORS by Ruslan Shevchenko, Oleh Cherniavskyi, Vasyl Shemchuk, Olena Zlobina, Natalia Benkovska, Nataliia Terentieva, Андрій Гуралюк

    Published 2024-06-01
    “…In the framework of our research we understand this competence as an integral quality of a person which combines motivation, knowledge, skills, experience in the use of modern information technologies during professional activities related to the performance of duties of future officers of the Ukrainian Navy of the Armed Forces of Ukraine (including  management of combat modules, unmanned aerial vehicles, digital weapons, the possibility of using artificial intelligence in combat systems, ensuring cyber security of weapons and military equipment, etc.). …”
    Get full text
    Article
  20. 120

    Designing a cyber insurance implementation model using foundational data theory by Behzad Esmaeilifar, manouchehr Ansari

    Published 2024-05-01
    “…Soleymani Rouzbahani & Hoseini (2016) in their research entitled "Study of crime and security insurance in cyberspace" referring to the rapid growth of technology, the introduction of computers and the use of the Internet and the resulting changes in human life, paid attention to Internet insurance as a tool to deal with the emergence of virtual crimes such as information theft in the world of internet communication. wang (2019) in his research entitled "Integrated framework for information security investment and cyber insurance" presented an analytical model for optimizing company cyber security and cyber insurance costs based on the effectiveness of costs and with the aim of reducing threats Cyber, vulnerability and effects. …”
    Get full text
    Article