-
21
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01Subjects: Get full text
Article -
22
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01Subjects: “…Cybersecurity…”
Get full text
Article -
23
APPLICATION OF ARTIFICIAL INTELLIGENCE FOR IMPROVING SITUATIONAL TRAINING OF CYBERSECURITY SPECIALISTS
Published 2023-10-01“…To create educational situations and options for resolving conflicting situations in cybersecurity management and cyber incidents with the aim of developing skills in future cybersecurity managers to make timely, correct, and effective decisions, it proposed to use the artificial intelligence tool - the ChatGPT language model. …”
Get full text
Article -
24
Review of Recent Advances in Predictive Maintenance and Cybersecurity for Solar Plants
Published 2025-01-01Subjects: Get full text
Article -
25
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01Get full text
Article -
26
Systematic Literature Review on Cybersecurity Issues in the Smart Home Environment
Published 2024-12-01Subjects: Get full text
Article -
27
Cybersecurity Practices and Supply Chain Performance: The Case of Jordanian Banks
Published 2024-12-01Subjects: “…cybersecurity…”
Get full text
Article -
28
Cybersecurity enhancement in the field of eHealth system development in Ukraine
Published 2024-12-01Subjects: Get full text
Article -
29
Securing Urban Landscape: Cybersecurity Mechanisms for Resilient Smart Cities
Published 2025-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
30
Modernization of the mechanism of the financial services market cybersecurity legal support
Published 2021-09-01Subjects: “…cybersecurity…”
Get full text
Article -
31
Editorial: Cybersecurity and artificial intelligence: advances, challenges, opportunities, threats
Published 2025-01-01Subjects: “…cybersecurity (CS)…”
Get full text
Article -
32
Selling Safely: Cybersecurity Best Practices for Small, Rural Ag Businesses
Published 2022-05-01“…This new 6-page publication of the UF/IFAS Department of Agricultural Education and Communication includes some cybersecurity best practices and links to resources for further education. …”
Get full text
Article -
33
Unveiling personalized and gamification-based cybersecurity risks within financial institutions
Published 2025-02-01“…This article critically assesses the evolving landscape of cyber threats specific to the financial industry, identifying trends, challenges, and innovative solutions to strengthen cybersecurity practices. Of particular interest is the application of AI-enhanced gamification strategies to reinforce cybersecurity protocols, particularly in the face of novel threats in gaming platforms. …”
Get full text
Article -
34
Cybersecurity e sovranità digitale nella protezione dei dati personali
Published 2024-12-01Subjects: “…cybersecurity…”
Get full text
Article -
35
STBM: secure and trustworthy blockchain-based model for cybersecurity service transactions
Published 2024-09-01Subjects: “…cybersecurity service…”
Get full text
Article -
36
Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift
Published 2023-01-01“…In this article, we have carried out a case study to optimize the classification of the maliciousness of cybersecurity events by IP addresses using machine learning techniques. …”
Get full text
Article -
37
Bibliometric Mapping of Scientific Production and Conceptual Structure of Cyber Sextortion in Cybersecurity
Published 2024-12-01“…This study examines cyber sextortion research using a comprehensive bibliometric analysis. In the field of cybersecurity, cyber sextortion is a form of cybercrime that leverages privacy violations to exploit a victim. …”
Get full text
Article -
38
Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity
Published 2022-09-01“… Mathematical and combinatorial techniques with nonnegative integers are used as computing algorithms for the programs development to apply in artificial intelligence and cybersecurity. Methodological advances in combinatorics and mathematics play a vital role in artificial intelligence and machine learning for data analysis and artificial intelligence-based cybersecurity for protection of the computing systems, devices, networks, programs and data from cyber-attacks. …”
Get full text
Article -
39
Exploration and practice of PRIDE teaching mode oriented to cybersecurity talent cultivation
Published 2021-08-01Subjects: “…cybersecurity…”
Get full text
Article -
40
Innovative Approaches to Ensuring Cybersecurity and Public Safety: The Socio-Economic Dimension
Published 2025-01-01“…This highlights the need to integrate cybersecurity measures into national economic development strategies. …”
Get full text
Article