Showing 1 - 20 results of 195 for search '"cyber security"', query time: 0.06s Refine Results
  1. 1

    CYBER SECURITY INVESTMENT by Dujam Kovač

    Published 2021-07-01
    Subjects: “…cyber security…”
    Get full text
    Article
  2. 2

    Cyber security and IT infrastructure protection /

    Published 2014
    View in OPAC
    Book
  3. 3

    Discussion on the cultivation of cyber security talents by Jian WENG, Linfeng WEI, Yue ZHANG

    Published 2019-06-01
    Subjects: “…cyber security…”
    Get full text
    Article
  4. 4

    Discussions on the talent cultivation of cyber security by Jian WENG, Chang-she MA, Liang GU

    Published 2016-02-01
    Subjects: “…cyber security…”
    Get full text
    Article
  5. 5

    Suggestions on cyber security talents cultivation by Hui LI, Ning ZHANG

    Published 2015-12-01
    Subjects: “…cyber security…”
    Get full text
    Article
  6. 6
  7. 7

    Optimization of cyber security through the implementation of AI technologies by Nawaf Liqaa, Bentotahewa Vibhushinie

    Published 2025-02-01
    “…The aim of this study is to contribute to cyber security optimization through implementing AI methodologies.…”
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Creating and Implementing an Effective and Deterrent National Cyber Security Strategy by Mustafa Senol, Ertugrul Karacuha

    Published 2020-01-01
    “…This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. …”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    Cyber Security Intrusion Detection Using a Deep Learning Method by Basheer Ullah, Shafiq-ur-Rehman Massan, M. Abdul Rehman, Rabia Ali Khan

    Published 2025-01-01
    “…This detection method may prove to be very useful for ensuring cyber security of computers hence preventing data and economic loss.…”
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Optimal defense strategy based on the mean field game model for cyber security by Li Miao, Lina Wang, Shuai Li, Haitao Xu, Xianwei Zhou

    Published 2019-02-01
    “…With the evolution of research on defense strategies in cyber security, the choice of an optimal strategy has become a key problem in current studies. …”
    Get full text
    Article
  20. 20