-
41
Efficient anomaly detection in tabular cybersecurity data using large language models
Published 2025-01-01“…Abstract In cybersecurity, anomaly detection in tabular data is essential for ensuring information security. …”
Get full text
Article -
42
Evolution of U.S. Policy Approaches to Ensuring Cybersecurity and Defense of Critical Information Infrastructure
Published 2020-11-01Subjects: Get full text
Article -
43
Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field
Published 2025-01-01Subjects: Get full text
Article -
44
Integrating sustainability into cybersecurity: insights from machine learning based topic modeling
Published 2025-01-01Subjects: Get full text
Article -
45
The Multilateral Integration of Blockchain, Ethical Packet Sniffing and AI for Cybersecurity in BRICS Countries
Published 2024-08-01Subjects: Get full text
Article -
46
Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review
Published 2025-01-01Subjects: Get full text
Article -
47
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
Published 2025-01-01Get full text
Article -
48
The impact of corporate social responsibility on cybersecurity behavior: The crucial role of organizationally-prescribed perfectionism
Published 2025-02-01“…Abstract This study delves into the ways in which corporate social responsibility (CSR) affects cybersecurity behavior among employees. It specifically examines the mediating effects of psychological safety and job stress, as well as the moderating role of organizationally-prescribed perfectionism. …”
Get full text
Article -
49
-
50
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges
Published 2020-01-01“…In the end, we integrated the trusted platform module in the IOT architecture to establish the trust in IOT computing and to enhance the cybersecurity challenges and evaluated it with the help of mathematical/algorithms/graph theory/matrices and logical diagrams.…”
Get full text
Article -
51
Improved self-training-based distant label denoising method for cybersecurity entity extractions.
Published 2024-01-01“…The task of named entity recognition (NER) plays a crucial role in extracting cybersecurity-related information. Existing approaches for cybersecurity entity extraction predominantly rely on manual labelling data, resulting in labour-intensive processes due to the lack of a cybersecurity-specific corpus. …”
Get full text
Article -
52
ARCS: Adaptive Reinforcement Learning Framework for Automated Cybersecurity Incident Response Strategy Optimization
Published 2025-01-01Subjects: Get full text
Article -
53
Development of the national cybersecurity system of Ukraine as a necessary element of information society development
Published 2021-12-01Subjects: “…cybersecurity…”
Get full text
Article -
54
BESS-Set: A Dataset for Cybersecurity Monitoring in a Battery Energy Storage System
Published 2024-01-01Subjects: Get full text
Article -
55
Few-shot cybersecurity event detection method by data augmentation with prompting question answering
Published 2024-08-01Subjects: “…cybersecurity…”
Get full text
Article -
56
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025-01-01“…The use of artificial intelligence (AI) technology signifies a significant milestone in the swiftly evolving domain of cybersecurity. This study offers a comprehensive literature review on the role, effect, and future prospects of AI across five critical areas of cybersecurity: threat detection, endpoint security, phishing and fraud detection, network security, and adaptive authentication. …”
Get full text
Article -
57
Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions
Published 2025-01-01Subjects: “…cybersecurity…”
Get full text
Article -
58
Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics
Published 2025-02-01Subjects: Get full text
Article -
59
-
60
Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph
Published 2021-09-01Subjects: Get full text
Article