-
1
Decentralizing security architecture: evaluating federalism’s role in enhancing security frameworks in Nigeria
Published 2024-06-01Subjects: Get full text
Article -
2
A review of cybersecurity incidents in the food and agriculture sector
Published 2025-10-01Subjects: Get full text
Article -
3
Zero Trust Cybersecurity: Procedures and Considerations in Context
Published 2024-10-01Subjects: Get full text
Article -
4
Efficient lightweight cryptographic solutions for enhancing data security in healthcare systems based on IoT
Published 2025-04-01Subjects: Get full text
Article -
5
Cloud Computing Security Construction Analysis of China Telecom Business Platform
Published 2013-04-01Subjects: Get full text
Article -
6
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01Subjects: Get full text
Article -
7
Electric internet of things security framework and technologies for energy interconnection
Published 2021-02-01Subjects: Get full text
Article -
8
A secure framework for the Internet of Things anomalies using machine learning
Published 2024-12-01Subjects: Get full text
Article -
9
Towards Intelligent Safety: A Systematic Review on Assault Detection and Technologies
Published 2025-06-01Subjects: Get full text
Article -
10
Building Cyber-Attack Immunity in Electric Energy System Inspired by Infectious Disease Ecology
Published 2024-01-01Subjects: Get full text
Article -
11
Building a Cybersecurity Culture in Higher Education: Proposing a Cybersecurity Awareness Paradigm
Published 2025-04-01Subjects: Get full text
Article -
12
A computational framework for IoT security integrating deep learning-based semantic algorithms for real-time threat response
Published 2025-05-01Subjects: Get full text
Article -
13
An AI-Driven Framework for Integrated Security and Privacy in Internet of Things Using Quantum-Resistant Blockchain
Published 2025-05-01Subjects: Get full text
Article -
14
Encryption of sensor data using the Lorentz attractor in embedded systems
Published 2025-05-01Subjects: Get full text
Article -
15
Dynamic Trust-based Access Control with Hybrid Encryption for Secure IoT Applications
Published 2025-05-01Subjects: “…internet of things security framework…”
Get full text
Article -
16
Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach
Published 2025-01-01Subjects: Get full text
Article