-
1
Cyberattack on the National Health Laboratory Service of South Africa – implications, response and recommendations
Published 2024-11-01Subjects: “…Cyberattack…”
Get full text
Article -
2
Dynamic Watermarking for Finite Markov Decision Processes
Published 2025-01-01Subjects: Get full text
Article -
3
An artificial insurance framework for a hydrogen-based microgrid to detect the advanced cyberattack model
Published 2025-01-01Subjects: Get full text
Article -
4
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025-01-01Subjects: Get full text
Article -
5
Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment
Published 2025-01-01Subjects: Get full text
Article -
6
Mathematical Modeling of Cyberattack Defense Mechanism Using Hybrid Transfer Learning With Snow Ablation Optimization Algorithm in Critical Infrastructures
Published 2025-01-01Subjects: “…Cyberattack…”
Get full text
Article -
7
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
Published 2025-01-01Subjects: Get full text
Article -
8
Ensuring Cybersecurity in the Context of Digital Economy Development
Published 2020-11-01Subjects: Get full text
Article -
9
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Published 2025-01-01Subjects: Get full text
Article -
10
Cyberattacks and the Erosion of State Sovereignty
Published 2024-12-01Subjects: “…cyberattacks…”
Get full text
Article -
11
Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems
Published 2025-01-01Subjects: Get full text
Article -
12
Validation of a scale based on the DigComp framework on internet navigation and cybersecurity in older adults
Published 2025-01-01Subjects: Get full text
Article -
13
Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment
Published 2025-01-01Subjects: Get full text
Article -
14
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
Published 2024-01-01Subjects: Get full text
Article -
15
Prediction of Network Threats and Attacks by Mathematical Simulation
Published 2024-11-01Subjects: Get full text
Article -
16
Cooperative Localization of Multi-Agent Autonomous Aerial Vehicle (AAV) Networks in Intelligent Transportation Systems
Published 2025-01-01Subjects: Get full text
Article