-
1
Evolution,characteristics and revelation of the US cyber-security review system
Published 2019-12-01Subjects: Get full text
Article -
2
APPLICATION OF ARTIFICIAL INTELLIGENCE FOR IMPROVING SITUATIONAL TRAINING OF CYBERSECURITY SPECIALISTS
Published 2023-10-01Subjects: Get full text
Article -
3
Cyber-security governance framework pillars for Zimbabwean local authorities
Published 2025-12-01Subjects: “…Cyber-security…”
Get full text
Article -
4
Study on designation of cyber information assurance education in USA
Published 2016-01-01Subjects: “…cyber security…”
Get full text
Article -
5
Discussions on the talent cultivation of cyber security
Published 2016-02-01Subjects: “…cyber security…”
Get full text
Article -
6
Suggestions on cyber security talents cultivation
Published 2015-12-01Subjects: “…cyber security…”
Get full text
Article -
7
Quantum information course for the undergraduate students of cyber security
Published 2019-06-01Subjects: Get full text
Article -
8
A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques
Published 2024-12-01Subjects: Get full text
Article -
9
Research progress of abnormal user detection technology in social network
Published 2018-03-01Subjects: Get full text
Article -
10
A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks
Published 2024-11-01Subjects: Get full text
Article -
11
Research on cyberspace security situation awareness
Published 2016-10-01Subjects: “…cyber security…”
Get full text
Article -
12
Accelerated traffic replay method based on time compression
Published 2021-10-01Subjects: “…cyber security…”
Get full text
Article -
13
CYBERCRIME IN RUSSIA: CURRENT CHALLENGES AND GOOD PRACTICES IN COMBATING CYBERCRIME
Published 2022-04-01Subjects: Get full text
Article -
14
-
15
Fusion of Focal Loss’s cyber threat intelligence entity extraction
Published 2022-07-01Subjects: “…cyber security…”
Get full text
Article -
16
Cyber security and need to change the model of monitoring fraud and financial crime
Published 2020-01-01Subjects: Get full text
Article -
17
Cyber ranges: survey and perspective
Published 2024-10-01Subjects: “…cyber security…”
Get full text
Article -
18
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Published 2025-01-01Subjects: Get full text
Article -
19
High resistance botnet based on smart contract
Published 2021-08-01Subjects: “…cyber security…”
Get full text
Article -
20
Research on active defense application based on honeypot
Published 2018-01-01Subjects: “…cyber security…”
Get full text
Article