-
101
CoAt-Set: Transformed coordinated attack dataset for collaborative intrusion detection simulationMendeley Data
Published 2025-04-01Subjects: “…Cybersecurity…”
Get full text
Article -
102
A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure
Published 2025-01-01Subjects: Get full text
Article -
103
Is a Theory of Cyberspace Dominance Possible? An Assessment from the Perspective of China’s Cyber Sovereignty Approach
Published 2024-12-01Subjects: Get full text
Article -
104
Password strength verification based on machine learning algorithms and LSTM recurrent neural networks
Published 2023-08-01Subjects: “…cybersecurity…”
Get full text
Article -
105
Safeguarding Mobile Users from Violation by Third-party Apps
Published 2025-01-01Subjects: “…cia cybersecurity…”
Get full text
Article -
106
A neutrosophic framework for evaluating security measures in information systems
Published 2024-11-01Subjects: “…cybersecurity…”
Get full text
Article -
107
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
Published 2025-01-01Subjects: Get full text
Article -
108
A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats
Published 2024-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
109
A Framework for Resilient Community Microgrids: Review of Operational Strategies and Performance Metrics
Published 2025-01-01Subjects: Get full text
Article -
110
Modern legislation regarding the challenges of 21st century technology - selected aspects of legal regulations and technology security
Published 2024-12-01Subjects: “…cybersecurity…”
Get full text
Article -
111
Research on knowledge graph construction technology for cyber threat intelligence based on large language models
Published 2024-11-01Subjects: Get full text
Article -
112
Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations
Published 2025-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
113
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01Subjects: Get full text
Article -
114
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
Published 2024-01-01Subjects: Get full text
Article -
115
PREVENTING CYBER ATTACKS ON CRIRICAL INFRASTRUCTURE: A NEW PRIORITY FOR THE RUSSIAN PUBLIC DIPLOMACY?
Published 2013-10-01Subjects: Get full text
Article -
116
Utilizing Artificial neural networks (ANN) to regulate Smart cities for sustainable Urban Development and Safeguarding Citizen rights
Published 2024-12-01Subjects: Get full text
Article -
117
An Automated Compliance Framework for Critical Infrastructure Security Through Artificial Intelligence
Published 2025-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
118
Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix
Published 2023-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
119
Increasing the cyber resilience of SMEs through open-source solutions and international collaboration
Published 2025-01-01Subjects: “…cybersecurity…”
Get full text
Article -
120
Effects of feature selection and normalization on network intrusion detection
Published 2025-03-01Subjects: “…Cybersecurity…”
Get full text
Article