Showing 221 - 240 results of 358 for search '"cybersecurity"', query time: 0.04s Refine Results
  1. 221
  2. 222

    Leveraging the BRICS Digital Partnership for Collaborative Digital Governance by Odilile Ayodele, Vhonani Petla

    Published 2024-08-01
    “…This framework promotes cooperation on various digital issues, including cybersecurity, data protection, and e-commerce.  This policy brief examines how the framework can be leveraged to benefit the BRICS countries. …”
    Get full text
    Article
  3. 223

    Public-private partnerships in National Security. A case study in the context of the war in Ukraine: 2022-2024 by Iryna Dragan, Tetiana Panfilova, Iryna Chistiakova, Roman Tatarinov

    Published 2024-12-01
    “…In the case of Ukraine, this strategic partnership involves collaboration between the government and various private companies such as Microsoft, Palantir Technologies and Northrop Grumman, especially in areas such as: cybersecurity, production of inputs, paramilitary organizations, and logistical support of troops on the front lines. …”
    Get full text
    Article
  4. 224

    Renewable energy in chemical industrial buildings for cost performance by Bernadette Detty Kussumardianadewi, Albert Eddy Husin, Lastarida Sinaga

    Published 2025-01-01
    “…Within this particular context, the main goals are to improve cost-effectiveness, bolster cybersecurity measures, improve information sharing and management, expedite payment transactions, and advance sustainability. …”
    Get full text
    Article
  5. 225

    Analysis of Compliance with WCAG Guidelines Regarding Contrast Im-plementation in an E-Learning Quiz by Krzysztof Dziedzic, Marcin Barszcz, Tomasz Wiśniewski

    Published 2024-06-01
    “…Quizzes in the field of cybersecurity were designed to meet contrast guidelines according to the WCAG 2.1 stand-ard, followed by user testing. …”
    Get full text
    Article
  6. 226

    Synthetic Browsing Histories for 50 Countries Worldwide: Datasets for Research, Development, and Education by Dan Komosny, Saeed Ur Rehman, Muhammad Sohaib Ayub

    Published 2025-01-01
    “…Abstract Browsing histories can be a valuable resource for cybersecurity, research, and testing. Individuals are often reluctant to share their browsing histories online, and the use of personal data requires obtaining signed informed consent. …”
    Get full text
    Article
  7. 227

    Exploring the Contribution of Fintech to Digital Transformation in Indonesian MSMEs: A Literature Review by Widia Febriyani, Nurdinintya Athari Supratman, R.Wahjoe Witjaksono

    Published 2024-11-01
    “…However, barriers such as low digital literacy, complex regulations, and cybersecurity concerns persist. The findings provide valuable insights for policymakers and practitioners to develop effective strategies for supporting MSMEs in leveraging Fintech for sustainable growth and competitiveness.…”
    Get full text
    Article
  8. 228

    Formation of the TNI Cyber Force: A Strategic and Policy Analysis by Aris Sarjito

    Published 2024-11-01
    “…This study uses a qualitative method with a secondary data analysis approach, including reports from Fortinet, AwanPintar.id, and national policy documents related to cybersecurity. The research findings show that the TNI Cyber Force has a crucial role in protecting Indonesia's critical infrastructure from the threat of botnets, ransomware, and other cyber-attacks. …”
    Get full text
    Article
  9. 229

    Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring by Alde Alanda, H.A Mooduto, Ronal Hadi

    Published 2023-09-01
    “… As cloud computing grows exponentially, organizations face escalating cybersecurity challenges due to increased cyber threats and attacks on cloud-based networks. …”
    Get full text
    Article
  10. 230

    Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms by Seunghyun Park, Jin-Young Choi

    Published 2020-01-01
    “…The recent trend for vehicles to be connected to unspecified devices, vehicles, and infrastructure increases the potential for external threats to vehicle cybersecurity. Thus, intrusion detection is a key network security function in vehicles with open connectivity, such as self-driving and connected cars. …”
    Get full text
    Article
  11. 231
  12. 232

    Advanced Network Traffic Prediction Using Deep Learning Techniques: A Comparative Study of SVR, LSTM, GRU, and Bidirectional LSTM Models by Wang Yuxin

    Published 2025-01-01
    “…Accurate prediction of network traffic patterns is essential for optimizing network resource allocation, managing congestion, and strengthening cybersecurity. This study examines the effectiveness of four machine learning models—Support Vector Regression (SVR), Long Short-Term Memory (LSTM), Gated Recurrent Units (GRU), and Bidirectional Long Short-Term Memory (Bi-LSTM)—in forecasting traffic patterns using both web-based and real-world datasets. …”
    Get full text
    Article
  13. 233

    Enhancing Spam Filtering: A Comparative Study of Modern Advanced Machine Learning Techniques by Zhang Chenwei

    Published 2025-01-01
    “…Spam remains a persistent issue that not only consumes time and bandwidth but also poses significant cybersecurity threats. As a result, effective spam filtering has become essential. …”
    Get full text
    Article
  14. 234

    Cyberattack on the National Health Laboratory Service of South Africa – implications, response and recommendations by S Cassim, Z C Chapanduka

    Published 2024-11-01
    “… Cybersecurity is now an integral consideration in the management of healthcare institutions in this modern technological era. …”
    Get full text
    Article
  15. 235

    The concept of security in German foreign policy by Artem P. Sokolov

    Published 2024-08-01
    “…This is also reflected in other guiding documents, such as the White Paper of the Bundeswehr, the Guiding Principles of Feminist Foreign Policy, the Cybersecurity Strategy. The «change of eras» concept announced by Olaf Scholz updated the security debate by addressing traditional military threats, launching a general revision of the security concept in German politics. …”
    Get full text
    Article
  16. 236

    Reflecting on Diversity and Gender Equality in Artificial Intelligence in Africa by Helen Titilola Olojede

    Published 2025-01-01
    “…World Economic Report states that worldwide, only about 22% of women are in the field of artificial intelligence compared to 78% of men. In the 2022 Cybersecurity Workforce Report, women account for just 24%. …”
    Get full text
    Article
  17. 237

    Cyber ranges: survey and perspective by ZOU Xing, HU Ning, GU Zhaoquan, JIA Yan

    Published 2024-10-01
    “…To support research on cybersecurity technologies and to avoid the potential effects of attack and defense exercises and technical verification on real networks and production environments, numerous cyber ranges emerged. …”
    Get full text
    Article
  18. 238

    Metric-based learning approach to botnet detection with small samples by Honggang LIN, Junjing ZHU, Lin CHEN

    Published 2023-10-01
    “…Botnets pose a great threat to the Internet, and early detection is crucial for maintaining cybersecurity.However, in the early stages of botnet discovery, obtaining a small number of labeled samples restricts the training of current detection models based on deep learning, leading to poor detection results.To address this issue, a botnet detection method called BT-RN, based on metric learning, was proposed for small sample backgrounds.The task-based meta-learning training strategy was used to optimize the model.The verification set was introduced into the task and the similarity between the verification sample and the training sample feature representation was measured to quickly accumulate experience, thereby reducing the model’s dependence on the labeled sample space.The feature-level attention mechanism was introduced.By calculating the attention coefficients of each dimension in the feature, the feature representation was re-integrated and the importance attention was assigned to optimize the feature representation, thereby reducing the feature sparseness of the deep neural network in small samples.The residual network design pattern was introduced, and the skip link was used to avoid the risk of model degradation and gradient disappearance caused by the deeper network after increasing the feature-level attention mechanism module.…”
    Get full text
    Article
  19. 239

    Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms by Purushottam Singh, Prashant Pranav, Sandip Dutta

    Published 2025-01-01
    “…This study underscores the potential of leveraging machine learning and evolutionary algorithms to advance cryptographic protocol security and efficiency, laying a robust foundation for future advancements in cybersecurity.…”
    Get full text
    Article
  20. 240

    Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application by Nuri Wulandari, Mohammad Syauqi Adnan, Chastio Bayu Wicaksono

    Published 2022-01-01
    “…A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. …”
    Get full text
    Article