-
121
Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles
Published 2024-01-01Subjects: “…Cybersecurity…”
Get full text
Article -
122
-
123
Empowering Security Operation Center With Artificial Intelligence and Machine Learning—A Systematic Literature Review
Published 2025-01-01Subjects: Get full text
Article -
124
Detecting Subtle Cyberattacks on Adaptive Cruise Control Vehicles: A Machine Learning Approach
Published 2025-01-01Subjects: Get full text
Article -
125
-
126
Cyber Insurance Adoption and Digitalisation in Small and Medium-Sized Enterprises
Published 2025-01-01Subjects: “…cybersecurity…”
Get full text
Article -
127
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01Subjects: “…cybersecurity…”
Get full text
Article -
128
Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data
Published 2025-01-01Subjects: Get full text
Article -
129
New Heuristics Method for Malicious URLs Detection Using Machine Learning
Published 2024-09-01Subjects: “…Malicious URLs, Machine Learning, Cybersecurity, Logistic Regression, Random Forest, Support Vector Machines…”
Get full text
Article -
130
Digitalization of business increases the costs of information security
Published 2020-04-01Subjects: Get full text
Article -
131
Digital Transformation: Improving Operation Efficiencies Through AI-Predictive Analysis Network at a Vancouver Catering Services
Published 2024-10-01Subjects: Get full text
Article -
132
Legal support for information security of legal entities under Lithuanian and Ukrainian legislation
Published 2023-12-01Subjects: Get full text
Article -
133
Fast anomalous traffic detection system for secure vehicular communications
Published 2024-12-01Subjects: “…cybersecurity…”
Get full text
Article -
134
Cyber security entity recognition method based on residual dilation convolution neural network
Published 2020-10-01Subjects: “…cybersecurity,entity recognition…”
Get full text
Article -
135
Internet of Things (IoT) technologies: features, development prospects and potential threats
Published 2024-11-01Subjects: Get full text
Article -
136
The Risk of Escalating Cyberattacks and Financial Fraud During Wartime: The Maturity of The County's Judicial System in Combating Cyber and Financial Crimes
Published 2024-12-01Subjects: “…cybersecurity…”
Get full text
Article -
137
Emerging Technologies Driving Zero Trust Maturity Across Industries
Published 2025-01-01Subjects: Get full text
Article -
138
Protection of personal data under martial law in Ukraine
Published 2023-09-01Subjects: Get full text
Article -
139
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01Subjects: “…Cybersecurity measures…”
Get full text
Article -
140
Graph Neural Network-Based Approach for Detecting False Data Injection Attacks on Voltage Stability
Published 2025-01-01Subjects: “…Cybersecurity…”
Get full text
Article