-
221
Reinforcement Learning-Based Generative Security Framework for Host Intrusion Detection
Published 2025-01-01Get full text
Article -
222
Leveraging the BRICS Digital Partnership for Collaborative Digital Governance
Published 2024-08-01“…This framework promotes cooperation on various digital issues, including cybersecurity, data protection, and e-commerce. This policy brief examines how the framework can be leveraged to benefit the BRICS countries. …”
Get full text
Article -
223
Public-private partnerships in National Security. A case study in the context of the war in Ukraine: 2022-2024
Published 2024-12-01“…In the case of Ukraine, this strategic partnership involves collaboration between the government and various private companies such as Microsoft, Palantir Technologies and Northrop Grumman, especially in areas such as: cybersecurity, production of inputs, paramilitary organizations, and logistical support of troops on the front lines. …”
Get full text
Article -
224
Renewable energy in chemical industrial buildings for cost performance
Published 2025-01-01“…Within this particular context, the main goals are to improve cost-effectiveness, bolster cybersecurity measures, improve information sharing and management, expedite payment transactions, and advance sustainability. …”
Get full text
Article -
225
Analysis of Compliance with WCAG Guidelines Regarding Contrast Im-plementation in an E-Learning Quiz
Published 2024-06-01“…Quizzes in the field of cybersecurity were designed to meet contrast guidelines according to the WCAG 2.1 stand-ard, followed by user testing. …”
Get full text
Article -
226
Synthetic Browsing Histories for 50 Countries Worldwide: Datasets for Research, Development, and Education
Published 2025-01-01“…Abstract Browsing histories can be a valuable resource for cybersecurity, research, and testing. Individuals are often reluctant to share their browsing histories online, and the use of personal data requires obtaining signed informed consent. …”
Get full text
Article -
227
Exploring the Contribution of Fintech to Digital Transformation in Indonesian MSMEs: A Literature Review
Published 2024-11-01“…However, barriers such as low digital literacy, complex regulations, and cybersecurity concerns persist. The findings provide valuable insights for policymakers and practitioners to develop effective strategies for supporting MSMEs in leveraging Fintech for sustainable growth and competitiveness.…”
Get full text
Article -
228
Formation of the TNI Cyber Force: A Strategic and Policy Analysis
Published 2024-11-01“…This study uses a qualitative method with a secondary data analysis approach, including reports from Fortinet, AwanPintar.id, and national policy documents related to cybersecurity. The research findings show that the TNI Cyber Force has a crucial role in protecting Indonesia's critical infrastructure from the threat of botnets, ransomware, and other cyber-attacks. …”
Get full text
Article -
229
Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring
Published 2023-09-01“… As cloud computing grows exponentially, organizations face escalating cybersecurity challenges due to increased cyber threats and attacks on cloud-based networks. …”
Get full text
Article -
230
Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms
Published 2020-01-01“…The recent trend for vehicles to be connected to unspecified devices, vehicles, and infrastructure increases the potential for external threats to vehicle cybersecurity. Thus, intrusion detection is a key network security function in vehicles with open connectivity, such as self-driving and connected cars. …”
Get full text
Article -
231
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory
Published 2024-01-01Get full text
Article -
232
Advanced Network Traffic Prediction Using Deep Learning Techniques: A Comparative Study of SVR, LSTM, GRU, and Bidirectional LSTM Models
Published 2025-01-01“…Accurate prediction of network traffic patterns is essential for optimizing network resource allocation, managing congestion, and strengthening cybersecurity. This study examines the effectiveness of four machine learning models—Support Vector Regression (SVR), Long Short-Term Memory (LSTM), Gated Recurrent Units (GRU), and Bidirectional Long Short-Term Memory (Bi-LSTM)—in forecasting traffic patterns using both web-based and real-world datasets. …”
Get full text
Article -
233
Enhancing Spam Filtering: A Comparative Study of Modern Advanced Machine Learning Techniques
Published 2025-01-01“…Spam remains a persistent issue that not only consumes time and bandwidth but also poses significant cybersecurity threats. As a result, effective spam filtering has become essential. …”
Get full text
Article -
234
Cyberattack on the National Health Laboratory Service of South Africa – implications, response and recommendations
Published 2024-11-01“… Cybersecurity is now an integral consideration in the management of healthcare institutions in this modern technological era. …”
Get full text
Article -
235
The concept of security in German foreign policy
Published 2024-08-01“…This is also reflected in other guiding documents, such as the White Paper of the Bundeswehr, the Guiding Principles of Feminist Foreign Policy, the Cybersecurity Strategy. The «change of eras» concept announced by Olaf Scholz updated the security debate by addressing traditional military threats, launching a general revision of the security concept in German politics. …”
Get full text
Article -
236
Reflecting on Diversity and Gender Equality in Artificial Intelligence in Africa
Published 2025-01-01“…World Economic Report states that worldwide, only about 22% of women are in the field of artificial intelligence compared to 78% of men. In the 2022 Cybersecurity Workforce Report, women account for just 24%. …”
Get full text
Article -
237
Cyber ranges: survey and perspective
Published 2024-10-01“…To support research on cybersecurity technologies and to avoid the potential effects of attack and defense exercises and technical verification on real networks and production environments, numerous cyber ranges emerged. …”
Get full text
Article -
238
Metric-based learning approach to botnet detection with small samples
Published 2023-10-01“…Botnets pose a great threat to the Internet, and early detection is crucial for maintaining cybersecurity.However, in the early stages of botnet discovery, obtaining a small number of labeled samples restricts the training of current detection models based on deep learning, leading to poor detection results.To address this issue, a botnet detection method called BT-RN, based on metric learning, was proposed for small sample backgrounds.The task-based meta-learning training strategy was used to optimize the model.The verification set was introduced into the task and the similarity between the verification sample and the training sample feature representation was measured to quickly accumulate experience, thereby reducing the model’s dependence on the labeled sample space.The feature-level attention mechanism was introduced.By calculating the attention coefficients of each dimension in the feature, the feature representation was re-integrated and the importance attention was assigned to optimize the feature representation, thereby reducing the feature sparseness of the deep neural network in small samples.The residual network design pattern was introduced, and the skip link was used to avoid the risk of model degradation and gradient disappearance caused by the deeper network after increasing the feature-level attention mechanism module.…”
Get full text
Article -
239
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01“…This study underscores the potential of leveraging machine learning and evolutionary algorithms to advance cryptographic protocol security and efficiency, laying a robust foundation for future advancements in cybersecurity.…”
Get full text
Article -
240
Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
Published 2022-01-01“…A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. …”
Get full text
Article