-
21
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01Subjects: “…Cybersecurity…”
Get full text
Article -
22
-
23
Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
Published 2025-01-01Subjects: Get full text
Article -
24
Systematic Literature Review of Machine Learning Models for Detecting DDoS Attacks in IoT Networks
Published 2024-12-01Subjects: Get full text
Article -
25
Development of the national cybersecurity system of Ukraine as a necessary element of information society development
Published 2021-12-01Subjects: “…cybersecurity…”
Get full text
Article -
26
CoAt-Set: Transformed coordinated attack dataset for collaborative intrusion detection simulationMendeley Data
Published 2025-04-01Subjects: “…Cybersecurity…”
Get full text
Article -
27
Enhancing cybersecurity incident response: AI-driven optimization for strengthened advanced persistent threat detection
Published 2025-03-01Subjects: “…Cybersecurity incident response…”
Get full text
Article -
28
A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure
Published 2025-01-01Subjects: Get full text
Article -
29
Is a Theory of Cyberspace Dominance Possible? An Assessment from the Perspective of China’s Cyber Sovereignty Approach
Published 2024-12-01Subjects: Get full text
Article -
30
Password strength verification based on machine learning algorithms and LSTM recurrent neural networks
Published 2023-08-01Subjects: “…cybersecurity…”
Get full text
Article -
31
Safeguarding Mobile Users from Violation by Third-party Apps
Published 2025-01-01Subjects: “…cia cybersecurity…”
Get full text
Article -
32
A neutrosophic framework for evaluating security measures in information systems
Published 2024-11-01Subjects: “…cybersecurity…”
Get full text
Article -
33
Hybrid dung beetle optimization based dimensionality reduction with deep learning based cybersecurity solution on IoT environment
Published 2025-01-01Subjects: Get full text
Article -
34
A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats
Published 2024-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
35
A Framework for Resilient Community Microgrids: Review of Operational Strategies and Performance Metrics
Published 2025-01-01Subjects: Get full text
Article -
36
ARCS: Adaptive Reinforcement Learning Framework for Automated Cybersecurity Incident Response Strategy Optimization
Published 2025-01-01Subjects: Get full text
Article -
37
Cybersecurity of the municipal infrastructure
Published 2023-03-01Subjects: “…cybersecurity…”
Get full text
Article -
38
BESS-Set: A Dataset for Cybersecurity Monitoring in a Battery Energy Storage System
Published 2024-01-01Subjects: Get full text
Article -
39
Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations
Published 2025-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
40
TOPSIS-based framework for evaluating employee cybersecurity risk
Published 2025-01-01Subjects: “…cybersecurity risk assessment…”
Get full text
Article