-
1
-
2
Optimization of cyber security through the implementation of AI technologies
Published 2025-02-01“…The aim of this study is to contribute to cyber security optimization through implementing AI methodologies.…”
Get full text
Article -
3
Cyber security laws and safety in e-commerce in India
Published 2023-06-01Subjects: Get full text
Article -
4
Creating and Implementing an Effective and Deterrent National Cyber Security Strategy
Published 2020-01-01“…This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. …”
Get full text
Article -
5
Cyber-security governance framework pillars for Zimbabwean local authorities
Published 2025-12-01Subjects: “…Cyber-security…”
Get full text
Article -
6
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
Published 2024-06-01Subjects: Get full text
Article -
7
Cyber security and need to change the model of monitoring fraud and financial crime
Published 2020-01-01Subjects: Get full text
Article -
8
Cyber Security of the Economy and Public Finances: Historiography and Post-War Trajectory of Development
Published 2024-06-01Subjects: Get full text
Article -
9
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Published 2020-01-01Get full text
Article -
10
Optimal defense strategy based on the mean field game model for cyber security
Published 2019-02-01“…With the evolution of research on defense strategies in cyber security, the choice of an optimal strategy has become a key problem in current studies. …”
Get full text
Article -
11
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Get full text
Article -
12
Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review
Published 2025-01-01Subjects: “…cyber security…”
Get full text
Article -
13
APPLICATION OF ARTIFICIAL INTELLIGENCE FOR IMPROVING SITUATIONAL TRAINING OF CYBERSECURITY SPECIALISTS
Published 2023-10-01Subjects: Get full text
Article -
14
-
15
A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques
Published 2024-12-01Subjects: Get full text
Article -
16
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Published 2025-01-01Subjects: Get full text
Article -
17
The Paradox of Cyber Warfare and Clausewitz’s Conception of War
Published 2025-01-01Subjects: Get full text
Article -
18
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: Get full text
Article -
19
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01Subjects: “…Cyber Security…”
Get full text
Article -
20
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025-01-01Subjects: Get full text
Article