Showing 21 - 40 results of 358 for search '"cybersecurity"', query time: 0.07s Refine Results
  1. 21
  2. 22
  3. 23

    APPLICATION OF ARTIFICIAL INTELLIGENCE FOR IMPROVING SITUATIONAL TRAINING OF CYBERSECURITY SPECIALISTS by Yurii V. Shchavinsky, Tetiana M. Muzhanova, Yuriy M. Yakymenko, Mykhailo M. Zaporozhchenko

    Published 2023-10-01
    “…To create educational situations and options for resolving conflicting situations in cybersecurity management and cyber incidents with the aim of developing skills in future cybersecurity managers to make timely, correct, and effective decisions, it proposed to use the artificial intelligence tool - the ChatGPT language model. …”
    Get full text
    Article
  4. 24
  5. 25
  6. 26
  7. 27
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32

    Selling Safely: Cybersecurity Best Practices for Small, Rural Ag Businesses by Lauri M. Baker, Cheryl R. Boyer, Russell Boyer

    Published 2022-05-01
    “…This new 6-page publication of the UF/IFAS Department of Agricultural Education and Communication includes some cybersecurity best practices and links to resources for further education. …”
    Get full text
    Article
  13. 33

    Unveiling personalized and gamification-based cybersecurity risks within financial institutions by Amna Shahzadi, Kashif Ishaq, Naeem A. Nawaz, Fadhilah Rosdi, Fawad Ali Khan

    Published 2025-02-01
    “…This article critically assesses the evolving landscape of cyber threats specific to the financial industry, identifying trends, challenges, and innovative solutions to strengthen cybersecurity practices. Of particular interest is the application of AI-enhanced gamification strategies to reinforce cybersecurity protocols, particularly in the face of novel threats in gaming platforms. …”
    Get full text
    Article
  14. 34
  15. 35
  16. 36

    Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift by M. V. Carriegos, N. DeCastro-García, D. Escudero

    Published 2023-01-01
    “…In this article, we have carried out a case study to optimize the classification of the maliciousness of cybersecurity events by IP addresses using machine learning techniques. …”
    Get full text
    Article
  17. 37

    Bibliometric Mapping of Scientific Production and Conceptual Structure of Cyber Sextortion in Cybersecurity by Fani Moses Radebe, Kennedy Njenga

    Published 2024-12-01
    “…This study examines cyber sextortion research using a comprehensive bibliometric analysis. In the field of cybersecurity, cyber sextortion is a form of cybercrime that leverages privacy violations to exploit a victim. …”
    Get full text
    Article
  18. 38

    Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity by Chinnaraji Annamalai

    Published 2022-09-01
    “… Mathematical and combinatorial techniques with nonnegative integers are used as computing algorithms for the programs development to apply in artificial intelligence and cybersecurity. Methodological advances in combinatorics and mathematics play a vital role in artificial intelligence and machine learning for data analysis and artificial intelligence-based cybersecurity for protection of the computing systems, devices, networks, programs and data from cyber-attacks. …”
    Get full text
    Article
  19. 39
  20. 40

    Innovative Approaches to Ensuring Cybersecurity and Public Safety: The Socio-Economic Dimension

    Published 2025-01-01
    “…This highlights the need to integrate cybersecurity measures into national economic development strategies. …”
    Get full text
    Article