Showing 41 - 60 results of 358 for search '"cybersecurity"', query time: 0.06s Refine Results
  1. 41

    Efficient anomaly detection in tabular cybersecurity data using large language models by Xiaoyong Zhao, Xingxin Leng, Lei Wang, Ningning Wang, Yanqiong Liu

    Published 2025-01-01
    “…Abstract In cybersecurity, anomaly detection in tabular data is essential for ensuring information security. …”
    Get full text
    Article
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46
  7. 47
  8. 48

    The impact of corporate social responsibility on cybersecurity behavior: The crucial role of organizationally-prescribed perfectionism by Byung-Jik Kim, Julak Lee

    Published 2025-02-01
    “…Abstract This study delves into the ways in which corporate social responsibility (CSR) affects cybersecurity behavior among employees. It specifically examines the mediating effects of psychological safety and job stress, as well as the moderating role of organizationally-prescribed perfectionism. …”
    Get full text
    Article
  9. 49
  10. 50

    Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges by Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Su Min Kim, Junsu Kim

    Published 2020-01-01
    “…In the end, we integrated the trusted platform module in the IOT architecture to establish the trust in IOT computing and to enhance the cybersecurity challenges and evaluated it with the help of mathematical/algorithms/graph theory/matrices and logical diagrams.…”
    Get full text
    Article
  11. 51

    Improved self-training-based distant label denoising method for cybersecurity entity extractions. by Ke Zhang, Yunpeng Wang, Ou Li, Sirui Hao, Junjiang He, Xiaolong Lan, Jinneng Yang, Yang Ye

    Published 2024-01-01
    “…The task of named entity recognition (NER) plays a crucial role in extracting cybersecurity-related information. Existing approaches for cybersecurity entity extraction predominantly rely on manual labelling data, resulting in labour-intensive processes due to the lack of a cybersecurity-specific corpus. …”
    Get full text
    Article
  12. 52
  13. 53
  14. 54
  15. 55
  16. 56

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity by Abdullah Al Siam, Moutaz Alazab, Albara Awajan, Nuruzzaman Faruqui

    Published 2025-01-01
    “…The use of artificial intelligence (AI) technology signifies a significant milestone in the swiftly evolving domain of cybersecurity. This study offers a comprehensive literature review on the role, effect, and future prospects of AI across five critical areas of cybersecurity: threat detection, endpoint security, phishing and fraud detection, network security, and adaptive authentication. …”
    Get full text
    Article
  17. 57
  18. 58
  19. 59
  20. 60