-
61
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Published 2025-01-01“…This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT–edge computing). …”
Get full text
Article -
62
Research on named entity recognition method in cybersecurity based on soft prompt tuning and reinforcement learning
Published 2024-10-01Subjects: “…cybersecurity named entity recognition…”
Get full text
Article -
63
Validation of a scale based on the DigComp framework on internet navigation and cybersecurity in older adults
Published 2025-01-01Subjects: “…cybersecurity…”
Get full text
Article -
64
Research on Spurious-Negative Sample Augmentation-Based Quality Evaluation Method for Cybersecurity Knowledge Graph
Published 2024-12-01Subjects: “…cybersecurity…”
Get full text
Article -
65
A Bibliometric Analysis of Agent-Based Systems in Cybersecurity and Broader Security Domains: Trends and Insights
Published 2025-01-01Subjects: Get full text
Article -
66
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Published 2024-01-01“…In the past decade, cybersecurity has become increasingly significant, driven largely by the increase in cybersecurity threats. …”
Get full text
Article -
67
Enhancing cybersecurity incident response: AI-driven optimization for strengthened advanced persistent threat detection
Published 2025-03-01Subjects: “…Cybersecurity incident response…”
Get full text
Article -
68
-
69
SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments
Published 2025-01-01“…The rapid growth of Internet of Things (IoT) devices presents significant cybersecurity challenges due to their diverse and resource-constrained nature. …”
Get full text
Article -
70
Blockchain-Facilitated Cybersecurity for Ubiquitous Internet of Things with Space–Air–Ground Integrated Networks: A Survey
Published 2025-01-01“…This article presents a systematic review on blockchain-facilitated cybersecurity solutions for Internet of Things (IoT) devices in space–air–ground integrated networks (SAGIN). …”
Get full text
Article -
71
A Novel AI-Based Integrated Cybersecurity Risk Assessment Framework and Resilience of National Critical Infrastructure
Published 2025-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
72
Using Peer-Learning and Game-Based Instruction for Achieving Long-Lasting Knowledge of Cybersecurity in Primary Schools
Published 2025-01-01Subjects: “…Cybersecurity education…”
Get full text
Article -
73
Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
Published 2025-01-01“…Existing studies do not explore vulnerabilities within SMEs regarding their effective compliance with the cybersecurity infrastructure to mitigate malware attacks. …”
Get full text
Article -
74
Hybrid dung beetle optimization based dimensionality reduction with deep learning based cybersecurity solution on IoT environment
Published 2025-01-01Subjects: Get full text
Article -
75
-
76
Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning
Published 2024-12-01“…However, more connected and engaged nodes also increase the system’s vulnerability to cybersecurity and privacy breaches. Various security and privacy challenges in vehicular cloud computing and its variants (VEC, VFC) can be efficiently tackled using machine learning (ML). …”
Get full text
Article -
77
Research of public infrastructure system and security policy in cyberspace
Published 2021-12-01Subjects: Get full text
Article -
78
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01Subjects: Get full text
Article -
79
-
80
Survey on rail transit mobile edge computing network security
Published 2023-04-01Subjects: Get full text
Article