Showing 61 - 80 results of 358 for search '"cybersecurity"', query time: 0.04s Refine Results
  1. 61

    Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions by Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, Shafiullah Khan, Noha Alnazzawi

    Published 2025-01-01
    “…This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT–edge computing). …”
    Get full text
    Article
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66

    Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection by Yixian Liu, Yupeng Dai

    Published 2024-01-01
    “…In the past decade, cybersecurity has become increasingly significant, driven largely by the increase in cybersecurity threats. …”
    Get full text
    Article
  7. 67
  8. 68
  9. 69

    SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments by Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Ali Nawaz, Muhammad Yasar Khan, Ayman Altameem

    Published 2025-01-01
    “…The rapid growth of Internet of Things (IoT) devices presents significant cybersecurity challenges due to their diverse and resource-constrained nature. …”
    Get full text
    Article
  10. 70

    Blockchain-Facilitated Cybersecurity for Ubiquitous Internet of Things with Space–Air–Ground Integrated Networks: A Survey by Wenbing Zhao, Shunkun Yang, Xiong Luo

    Published 2025-01-01
    “…This article presents a systematic review on blockchain-facilitated cybersecurity solutions for Internet of Things (IoT) devices in space–air–ground integrated networks (SAGIN). …”
    Get full text
    Article
  11. 71
  12. 72
  13. 73

    Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review by Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, Abdulkarim Kanaan Jebna, Kiran Adnan

    Published 2025-01-01
    “…Existing studies do not explore vulnerabilities within SMEs regarding their effective compliance with the cybersecurity infrastructure to mitigate malware attacks. …”
    Get full text
    Article
  14. 74
  15. 75
  16. 76

    Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning by Tiansheng Yang, Ruikai Sun, Rajkumar Singh Rathore, Imran Baig

    Published 2024-12-01
    “…However, more connected and engaged nodes also increase the system’s vulnerability to cybersecurity and privacy breaches. Various security and privacy challenges in vehicular cloud computing and its variants (VEC, VFC) can be efficiently tackled using machine learning (ML). …”
    Get full text
    Article
  17. 77
  18. 78
  19. 79
  20. 80