-
181
Unstructured Big Data Threat Intelligence Parallel Mining Algorithm
Published 2024-06-01“…Initially, open-source cybersecurity analysis reports are collected and converted into a standardized text format. …”
Get full text
Article -
182
Credit Card Fraud Detection through Parenclitic Network Analysis
Published 2018-01-01Get full text
Article -
183
Protecting digital assets using an ontology based cyber situational awareness system
Published 2025-01-01“…IntroductionCyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. …”
Get full text
Article -
184
Generalized Centered Binomial Distribution for Bimodal Lattice Signatures
Published 2025-01-01Get full text
Article -
185
Cyber security laws and safety in e-commerce in India
Published 2023-06-01“…CERT-In coordinates national cybersecurity incidents, while electronic signatures and digital certificates hold legal recognition. …”
Get full text
Article -
186
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection
Published 2019-01-01“…The feasibility of utilizing Granular Computing (GC) as a solution to the most current challenges in cybersecurity is researched. To the best of our knowledge, granular computing has not yet been widely examined or used for cybersecurity application purposes. …”
Get full text
Article -
187
Exploring the Role of Innovative Technologies in Smart Cities
Published 2024-12-01“…It further explored the policy, legal, and institutional frameworks that underpin the development and operation, including strategies for protecting and handling citizen data while also addressing both cybersecurity threats from cyberattacks and the privacy of citizens within these intelligent urban environments. …”
Get full text
Article -
188
Optimization of cyber security through the implementation of AI technologies
Published 2025-02-01Get full text
Article -
189
Overview on industrial Internet honeynet technology
Published 2024-10-01“…Honeynets emerged as a powerful cybersecurity measure, employing virtual or simulated systems, services, or resources to lure attackers. …”
Get full text
Article -
190
Blockchain-Based Anonymous Reputation System for Performance Appraisal
Published 2025-01-01Get full text
Article -
191
Improving Model Performance for Predicting Exfiltration Attacks Through Resampling Strategies
Published 2025-01-01“… Addressing class imbalance is critical in cybersecurity applications, particularly in scenarios like exfiltration detection, where skewed datasets lead to biased predictions and poor generalization for minority classes. …”
Get full text
Article -
192
Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
Published 2025-01-01“…The study contributes to improving cybersecurity in the Arab region by providing information on the dynamics of cyber threats and the method of operation of attack groups. …”
Get full text
Article -
193
Enhancing augmented reality with machine learning for hands-on origami training
Published 2025-01-01Get full text
Article -
194
Consumer Protection of Girls from Cybercrime in a Gender Perspective
Published 2024-12-01“…So it is necessary to study further the impact of cybercrime on girls and to analyze gender perspectives in protecting girls' consumers as vulnerable consumers. Education on cybersecurity should start early, with a special focus on girls. …”
Get full text
Article -
195
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01“…In this study, we delve into how these tools have been used offensively by attackers and how they serve defensive functions within cybersecurity. Additionally, we also introduce an automated all-in-one tool designed to consolidate the functionalities of Google dorks, Shodan, and Censys, offering a streamlined solution for vulnerability detection and analysis. …”
Get full text
Article -
196
INTERNET COMMUNICATION: NEW CHALLENGES FOR THE YOUTH
Published 2013-10-01“…In that connection the article discloses the functioning of international organizations like United Nations, European Union and Council of Europe aimed to the prevention of destructive forms of internet using and creation of global culture of cybersecurity.…”
Get full text
Article -
197
A Modular AI-Driven Intrusion Detection System for Network Traffic Monitoring in Industry 4.0, Using Nvidia Morpheus and Generative Adversarial Networks
Published 2024-12-01“…Every day, a considerable number of new cybersecurity attacks are reported, and the traditional methods of defense struggle to keep up with them. …”
Get full text
Article -
198
Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example
Published 2023-08-01“…The deployment of network security has become a crucial strategy for the development of modern nations, with skilled professionals serving as the core driving force behind cybersecurity efforts.Cultivating cybersecurity talents and fostering team building are essential for China's talent reserves and strategic capital accumulation.With economic globalization, 0-day vulnerabilities have constantly emerged in information systems, attack chains have become increasingly complex, threat targets were difficult to detect, and hidden viruses varied over time.Talents trained by traditional universities for network security were unable to adapt to innovative production and practical activities in the new fields, as it was confined to their training structure system.In order to break through the shackles of the internal administrative structure and traditional curriculum system of universities, and ease the contradiction between the uncertainty of cyberspace security situation and the standardization of talent cultivation, the talent cultivation models based on Bourdieu's theory were studied, the fusion meaning of cultural capital in the academic field was analyzed and three practical standards were put forward in terms of teaching content, cultivation model and teaching opportunity of cyberspace security talents in combination with the actual cases of the “Fang class”.In terms of education content, standards and open knowledge systems were established to meet the differentiated needs of students.The mentorship approach was employed to construct habitus, fostering students’ ability to adapt flexibly to problems by adopting different cognitive thinking modes.Favorable teaching opportunities were utilized by tutors in various roles to promote efficient integration of individuals and fields, helping students establish a valuable and stable mindset.By leveraging Bourdieu's theory to explore the integration path of academic fields, it has leveraged the advantages of independently cultivating high-quality talents, vigorously promoting technological innovation and the healthy ecological development of the industry.…”
Get full text
Article -
199
Digital competencies for municipalities – Findings from Switzerland as a role model for smart regions within the European Union member states
Published 2025-01-01“… The study shows that e-government services, cybersecurity and digital document management have been identified as key priorities for digitization in Swiss municipalities, which is crucial for the development of smart regions. …”
Get full text
Article -
200
Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection
Published 2025-12-01“…The findings highlight the possibility of proposed method in improving Android malware detection, thereby providing a strong answer in the changing scene of cybersecurity.…”
Get full text
Article