-
1
Cybersecurity activities for education and curriculum design: A survey
Published 2024-12-01Subjects: Get full text
Article -
2
IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES
Published 2014-05-01Subjects: Get full text
Article -
3
GAT-APG: Graph Attention Network-Based Attack Path Generation for Security Simulation
Published 2025-01-01Subjects: “…Cyber attack simulation…”
Get full text
Article -
4
ASPECTS OF SECURING BIOMEDICAL INFORMATICS NETWORKS AND SYSTEMS
Published 2024-12-01Subjects: “…cyber-attack…”
Get full text
Article -
5
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01Subjects: Get full text
Article -
6
Overview of anomaly detection techniques for industrial Internet of things
Published 2022-03-01Subjects: Get full text
Article -
7
Cyber intrusion detection using ensemble of deep learning with prediction scoring based optimized feature sets for IOT networks
Published 2025-12-01Subjects: “…Cyber-attack…”
Get full text
Article -
8
CYBERSECURITY AS A FACTOR IN THE DEVELOPMENT OF THE DIGITAL ECONOMY
Published 2022-02-01Subjects: Get full text
Article -
9
Cause Analysis and Enlightenment of Global Blackouts in the Past 30 Years
Published 2021-10-01Subjects: Get full text
Article -
10
Rogue Base Stations Detection for Advanced Metering Infrastructure Based on Signal Strength Clustering
Published 2020-01-01Subjects: Get full text
Article -
11
Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities
Published 2020-08-01Subjects: Get full text
Article -
12
STATE SOVEREIGNTY AND SELF-DEFENCE IN CYBERSPACE
Published 2018-12-01Subjects: Get full text
Article -
13
-
14
Cyber Sanctions as a Tool of Competition in Global Cyberspace
Published 2023-04-01Subjects: Get full text
Article -
15
Malware Classification Using Few-Shot Learning Approach
Published 2024-11-01Subjects: Get full text
Article -
16
IP SafeGuard–An AI-Driven Malicious IP Detection Framework
Published 2025-01-01Subjects: Get full text
Article -
17
Information Entropy Based Multi-Source Power IoT Terminal Equipment Trust Degree Evaluation Method
Published 2022-05-01Subjects: Get full text
Article -
18
-
19
Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
Published 2024-11-01Subjects: Get full text
Article -
20
Analyzing Impact of Computer Attacks on the Banking System of the Russian Federation
Published 2019-12-01Subjects: Get full text
Article