-
1
-
2
-
3
Discussion on the cultivation of cyber security talents
Published 2019-06-01Subjects: “…cyber security…”
Get full text
Article -
4
Discussions on the talent cultivation of cyber security
Published 2016-02-01Subjects: “…cyber security…”
Get full text
Article -
5
Suggestions on cyber security talents cultivation
Published 2015-12-01Subjects: “…cyber security…”
Get full text
Article -
6
Suggestions on cyber security talents cultivation
Published 2016-03-01Subjects: “…cyber security…”
Get full text
Article -
7
Optimization of cyber security through the implementation of AI technologies
Published 2025-02-01“…The aim of this study is to contribute to cyber security optimization through implementing AI methodologies.…”
Get full text
Article -
8
Quantum information course for the undergraduate students of cyber security
Published 2019-06-01Subjects: Get full text
Article -
9
Cyber security laws and safety in e-commerce in India
Published 2023-06-01Subjects: Get full text
Article -
10
Creating and Implementing an Effective and Deterrent National Cyber Security Strategy
Published 2020-01-01“…This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. …”
Get full text
Article -
11
Cyber-security governance framework pillars for Zimbabwean local authorities
Published 2025-12-01Subjects: “…Cyber-security…”
Get full text
Article -
12
Evolution,characteristics and revelation of the US cyber-security review system
Published 2019-12-01Subjects: Get full text
Article -
13
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
Published 2024-06-01Subjects: Get full text
Article -
14
Cyber Security Intrusion Detection Using a Deep Learning Method
Published 2025-01-01“…This detection method may prove to be very useful for ensuring cyber security of computers hence preventing data and economic loss.…”
Get full text
Article -
15
Cyber security and need to change the model of monitoring fraud and financial crime
Published 2020-01-01Subjects: Get full text
Article -
16
Cyber Security of the Economy and Public Finances: Historiography and Post-War Trajectory of Development
Published 2024-06-01Subjects: Get full text
Article -
17
THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE
Published 2024-05-01Subjects: Get full text
Article -
18
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Published 2020-01-01Get full text
Article -
19
Optimal defense strategy based on the mean field game model for cyber security
Published 2019-02-01“…With the evolution of research on defense strategies in cyber security, the choice of an optimal strategy has become a key problem in current studies. …”
Get full text
Article -
20
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Get full text
Article