-
201
A Paradigm for Modeling Infectious Diseases: Assessing Malware Spread in Early-Stage Outbreaks
Published 2024-12-01“…As digitalization and artificial intelligence advance, cybersecurity threats intensify, making malware—a type of software installed without authorization to harm users—an increasingly urgent concern. …”
Get full text
Article -
202
An Evolutionary Federated Learning Approach to Diagnose Alzheimer’s Disease Under Uncertainty
Published 2025-01-01Get full text
Article -
203
A review of electric vehicle technology: Architectures, battery technology and its management system, relevant standards, application of artificial intelligence, cyber security, an...
Published 2023-06-01“…This article thoroughly overviews cybersecurity challenges in EV applications and explains possible proactive measures. …”
Get full text
Article -
204
Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
Published 2024-11-01“…Experiments were conducted on two generic datasets and one cybersecurity dataset for knowledge graph quality assessment. …”
Get full text
Article -
205
Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations
Published 2024-12-01“…The Cybersecurity for Fire Protection Systems report from a workshop held by the Research Foundation in 2021 was analysed. …”
Get full text
Article -
206
Ad Click Fraud Detection Using Machine Learning and Deep Learning Algorithms
Published 2025-01-01Get full text
Article -
207
Impact of Defending Strategy Decision on DDoS Attack
Published 2021-01-01“…Distributed denial-of-service (DDoS) attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently. …”
Get full text
Article -
208
Survei Penelitian Metode Kecerdasan Buatan untuk Mendeteksi Ancaman Teknologi Serangan Siber
Published 2023-12-01“…The results of this research are expected to contribute to providing new insights into the world of cybersecurity to open future research opportunities, especially for novice researchers who wish to conduct research in the field of cybersecurity. …”
Get full text
Article -
209
End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT
Published 2025-01-01“…However, OT protocols often lack the rigor of cybersecurity capabilities that have become a critical characteristic of IT protocols. …”
Get full text
Article -
210
A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks
Published 2025-01-01“…Unlike traditional approaches, XIoT emphasizes interpretability by integrating explainable AI mechanisms, enabling cybersecurity analysts to understand and trust its predictions. …”
Get full text
Article -
211
Information Security Risk Framework for Digital Transformation Technologies
Published 2025-01-01“…Researchers have observed that, despite the advantages they bring, the cybersecurity risks associated with these technologies are not fully apparent. …”
Get full text
Article -
212
The Road to Recovery #5: Self-Assessment of Virtual Facilitation to Build Trust
Published 2021-03-01“…Specific recommendations are provided addressing concerns about short- and long-term virtual trust, inclusion techniques, Zoom fatigue, and cybersecurity. This new 5-page publication of the UF/IFAS Department of Agricultural Education and Communication was written by Colby Silvert, Cody Gusto, John Diaz, and Glenn Israel. https://edis.ifas.ufl.edu/wc388 …”
Get full text
Article -
213
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01“…In this paper, the authors test, through an active sniffing attack, the cybersecurity of the IoT devices that transmit data to the Cloud of the ThingSpeak platform. …”
Get full text
Article -
214
Zmiany w polskim systemie ochrony lotnictwa cywilnego
Published 2023-04-01“…The purpose of the article is to present and evaluate the changes in the National Training Program on civil aviation security, with a particular focus on the introduction of the topic of countering internal threats, including radicalization, the introduction of a new cybersecurity training, as well as concerning the expansion of the categories of people covered by the training on civil aviation security awareness. …”
Get full text
Article -
215
The Road to Recovery #5: Self-Assessment of Virtual Facilitation to Build Trust
Published 2021-03-01“…Specific recommendations are provided addressing concerns about short- and long-term virtual trust, inclusion techniques, Zoom fatigue, and cybersecurity. This new 5-page publication of the UF/IFAS Department of Agricultural Education and Communication was written by Colby Silvert, Cody Gusto, John Diaz, and Glenn Israel. https://edis.ifas.ufl.edu/wc388 …”
Get full text
Article -
216
ANTI-CRISIS FACTORS OF COMPETITIVENESS OF SERVICE SECTOR ENTERPRISES
Published 2021-02-01“…The paper analyses traditional basic factors of enterprise competitiveness as well as substantiates the anti-crisis factors of maintaining the competitive maintenance of a service sector enterprise in the context of the current economic crisis related to the COVID-19 pandemic, such as: digitalization of business and the process of providing services, customer focus, virtualization of the workforce, cybersecurity, and the use of opportunities of the state anti-crisis policy.…”
Get full text
Article -
217
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Published 2024-05-01“… Nowadays, cybersecurity has grown into a more significant and difficult sci-entific issue. …”
Get full text
Article -
218
Cybersicurezza e protezione dati: un rapporto ambivalente
Published 2024-07-01“…In particolare, la protezione dati è stata inizialmente e tradizionalmente concepita come parametro di legittimità dell’attività investigativa funzionale alla tutela della cybersecurity. Tuttavia questa declinazione del rapporto tra tali due interessi giuridici, in termini antagonisti, ha lasciato di lì a poco emergere una più interessante sinergia. …”
Get full text
Article -
219
-
220
Modified Autoencoder Training and Scoring for Robust Unsupervised Anomaly Detection in Deep Learning
Published 2020-01-01“…We demonstrate significant improvements over conventional AE training on image, remote-sensing, and cybersecurity datasets.…”
Get full text
Article