-
161
-
162
The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
163
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
164
Reusable and robust fuzzy extractor for CRS-dependent sources
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
165
A privacy-enhanced framework with deep learning for botnet detection
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
166
Privacy-preserving attribute-based access control using homomorphic encryption
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
167
Application research on network security operation automation practice based on RPA technology
Published 2024-07-01“…The research focuses on the entire lifecycle of networks and information systems, aiming at the full-process scenarios of cybersecurity operations. It establishes a capability framework based on robotic process automation (RPA) technology and adaptive cybersecurity technology, along with address the common pain points in cybersecurity operations, such as high manual dependency, relatively fragmented cybersecurity capability platforms, and missing key points in cybersecurity operations. …”
Get full text
Article -
168
Erratum to “A Hierarchical Attention Recommender System Based on Cross-Domain Social Networks”
Published 2021-01-01Get full text
Article -
169
Cybercrimes: A Proposed Taxonomy and Challenges
Published 2018-01-01“…Cybersecurity is one of the most important concepts of cyberworld which provides protection to the cyberspace from various types of cybercrimes. …”
Get full text
Article -
170
Mathematical Modeling of Cyberattack Defense Mechanism Using Hybrid Transfer Learning With Snow Ablation Optimization Algorithm in Critical Infrastructures
Published 2025-01-01“…It is probable to utilize AI to help and support cybersecurity solutions to develop cybersecurity of significant infrastructures. …”
Get full text
Article -
171
A novel lightweight Machine Learning framework for IoT malware classification based on matrix block mean Downsampling
Published 2025-01-01“…These smart objects are susceptible to cybersecurity threats and are easily affected by IoT malware. …”
Get full text
Article -
172
A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks
Published 2024-11-01“…Abstract AI techniques for cybersecurity are advancing, but AI-based classifiers are suspectable of adversarial attacks. …”
Get full text
Article -
173
-
174
Navigating secure storage requirements for EUDI Wallets: a review paper
Published 2025-01-01Get full text
Article -
175
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01“… The increasing significance of cybersecurity underscores the critical necessity of addressing evolving methods of hackers. …”
Get full text
Article -
176
A Hierarchical Attention Recommender System Based on Cross-Domain Social Networks
Published 2020-01-01Get full text
Article -
177
A Comparative Analysis of Support Vector Machine and K-Nearest Neighbors Models for Network Attack Traffic Detection
Published 2025-01-01“…With the continuous advancement of Internet technology, cybersecurity threats are growing more urgent as attack techniques become increasingly sophisticated. …”
Get full text
Article -
178
Mitigating Cyber Risks in AI-Driven Circular Economy Implementations
Published 2024-12-01“…At the same time, the study addresses the cybersecurity risks associated with these systems, including data breaches, system vulnerabilities, and ethical concerns. …”
Get full text
Article -
179
Ethical Analysis of the Responsibility Gap in Artificial Intelligence
Published 2025-01-01Get full text
Article -
180
The advantages of k-visibility: A comparative analysis of several time series clustering algorithms
Published 2024-12-01Get full text
Article