Showing 181 - 200 results of 358 for search '"cybersecurity"', query time: 0.05s Refine Results
  1. 181

    Unstructured Big Data Threat Intelligence Parallel Mining Algorithm by Zhihua Li, Xinye Yu, Tao Wei, Junhao Qian

    Published 2024-06-01
    “…Initially, open-source cybersecurity analysis reports are collected and converted into a standardized text format. …”
    Get full text
    Article
  2. 182
  3. 183

    Protecting digital assets using an ontology based cyber situational awareness system by Tariq Ammar Almoabady, Yasser Mohammad Alblawi, Ahmad Emad Albalawi, Majed M. Aborokbah, S. Manimurugan, Ahmed Aljuhani, Hussain Aldawood, P. Karthikeyan

    Published 2025-01-01
    “…IntroductionCyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. …”
    Get full text
    Article
  4. 184
  5. 185

    Cyber security laws and safety in e-commerce in India by A. K. Kashyap, M. Chaudhary

    Published 2023-06-01
    “…CERT-In coordinates national cybersecurity incidents, while electronic signatures and digital certificates hold legal recognition. …”
    Get full text
    Article
  6. 186

    Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection by Rafał Kozik, Marek Pawlicki, Michał Choraś, Witold Pedrycz

    Published 2019-01-01
    “…The feasibility of utilizing Granular Computing (GC) as a solution to the most current challenges in cybersecurity is researched. To the best of our knowledge, granular computing has not yet been widely examined or used for cybersecurity application purposes. …”
    Get full text
    Article
  7. 187

    Exploring the Role of Innovative Technologies in Smart Cities by Kagontle Selwe, Costa Hofisi

    Published 2024-12-01
    “…It further explored the policy, legal, and institutional frameworks that underpin the development and operation, including strategies for protecting and handling citizen data while also addressing both cybersecurity threats from cyberattacks and the privacy of citizens within these intelligent urban environments. …”
    Get full text
    Article
  8. 188
  9. 189

    Overview on industrial Internet honeynet technology by CHEN Xi, JIANG Yaguang, LIN Xin, ZHOU Wen

    Published 2024-10-01
    “…Honeynets emerged as a powerful cybersecurity measure, employing virtual or simulated systems, services, or resources to lure attackers. …”
    Get full text
    Article
  10. 190
  11. 191

    Improving Model Performance for Predicting Exfiltration Attacks Through Resampling Strategies by Arif Rahman Hakim, Kalamullah Ramli, Muhammad Salman, Esti Rahmawati Agustina

    Published 2025-01-01
    “… Addressing class imbalance is critical in cybersecurity applications, particularly in scenarios like exfiltration detection, where skewed datasets lead to biased predictions and poor generalization for minority classes. …”
    Get full text
    Article
  12. 192

    Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World by Seokhee Lee, Aisha Abdu Hassan Mujammami, Kyounggon Kim

    Published 2025-01-01
    “…The study contributes to improving cybersecurity in the Arab region by providing information on the dynamics of cyber threats and the method of operation of attack groups. …”
    Get full text
    Article
  13. 193
  14. 194

    Consumer Protection of Girls from Cybercrime in a Gender Perspective by Susilowati Suparto, Deviana Yuanitasari, Sonny Dewi Judiasih, Yamudin Salaeh

    Published 2024-12-01
    “…So it is necessary to study further the impact of cybercrime on girls and to analyze gender perspectives in protecting girls' consumers as vulnerable consumers. Education on cybersecurity should start early, with a special focus on girls. …”
    Get full text
    Article
  15. 195

    Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them by Abdullah Alabdulatif, Navod Neranjan Thilakarathne

    Published 2025-01-01
    “…In this study, we delve into how these tools have been used offensively by attackers and how they serve defensive functions within cybersecurity. Additionally, we also introduce an automated all-in-one tool designed to consolidate the functionalities of Google dorks, Shodan, and Censys, offering a streamlined solution for vulnerability detection and analysis. …”
    Get full text
    Article
  16. 196

    INTERNET COMMUNICATION: NEW CHALLENGES FOR THE YOUTH by D. N. Karpova

    Published 2013-10-01
    “…In that connection the article discloses the functioning of international organizations like United Nations, European Union and Council of Europe aimed to the prevention of destructive forms of internet using and creation of global culture of cybersecurity.…”
    Get full text
    Article
  17. 197

    A Modular AI-Driven Intrusion Detection System for Network Traffic Monitoring in Industry 4.0, Using Nvidia Morpheus and Generative Adversarial Networks by Beatrice-Nicoleta Chiriac, Florin-Daniel Anton, Anca-Daniela Ioniță, Bogdan-Valentin Vasilică

    Published 2024-12-01
    “…Every day, a considerable number of new cybersecurity attacks are reported, and the traditional methods of defense struggle to keep up with them. …”
    Get full text
    Article
  18. 198

    Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example by Qian ZHOU, Haiping HUANG, Le WANG, Yanchun ZHANG, Fu XIAO

    Published 2023-08-01
    “…The deployment of network security has become a crucial strategy for the development of modern nations, with skilled professionals serving as the core driving force behind cybersecurity efforts.Cultivating cybersecurity talents and fostering team building are essential for China's talent reserves and strategic capital accumulation.With economic globalization, 0-day vulnerabilities have constantly emerged in information systems, attack chains have become increasingly complex, threat targets were difficult to detect, and hidden viruses varied over time.Talents trained by traditional universities for network security were unable to adapt to innovative production and practical activities in the new fields, as it was confined to their training structure system.In order to break through the shackles of the internal administrative structure and traditional curriculum system of universities, and ease the contradiction between the uncertainty of cyberspace security situation and the standardization of talent cultivation, the talent cultivation models based on Bourdieu's theory were studied, the fusion meaning of cultural capital in the academic field was analyzed and three practical standards were put forward in terms of teaching content, cultivation model and teaching opportunity of cyberspace security talents in combination with the actual cases of the “Fang class”.In terms of education content, standards and open knowledge systems were established to meet the differentiated needs of students.The mentorship approach was employed to construct habitus, fostering students’ ability to adapt flexibly to problems by adopting different cognitive thinking modes.Favorable teaching opportunities were utilized by tutors in various roles to promote efficient integration of individuals and fields, helping students establish a valuable and stable mindset.By leveraging Bourdieu's theory to explore the integration path of academic fields, it has leveraged the advantages of independently cultivating high-quality talents, vigorously promoting technological innovation and the healthy ecological development of the industry.…”
    Get full text
    Article
  19. 199

    Digital competencies for municipalities – Findings from Switzerland as a role model for smart regions within the European Union member states by Christian SCHACHTNER, Nadine BAUMANN

    Published 2025-01-01
    “… The study shows that e-government services, cybersecurity and digital document management have been identified as key priorities for digitization in Swiss municipalities, which is crucial for the development of smart regions. …”
    Get full text
    Article
  20. 200

    Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection by Brij B. Gupta, Akshat Gaurav, Varsha Arya, Shavi Bansal, Razaz Waheeb Attar, Ahmed Alhomoud, Konstantinos Psannis

    Published 2025-12-01
    “…The findings highlight the possibility of proposed method in improving Android malware detection, thereby providing a strong answer in the changing scene of cybersecurity.…”
    Get full text
    Article