Results 201 to 210 of about 104,418 (235)
Some of the next articles are maybe not open access.
2023 IEEE Conference on Dependable and Secure Computing (DSC), 2023
Eric Cooper +4 more
openaire +1 more source
Eric Cooper +4 more
openaire +1 more source
2014
This chapter focuses on the understanding and skills needed by tomorrow's business leaders, namely understanding what security teams do and why security is so challenging based on external influences such as cyber espionage, warfare, and crime, which are currently having an adverse impact on the trust that customers have on the Internet and e-Business ...
openaire +1 more source
This chapter focuses on the understanding and skills needed by tomorrow's business leaders, namely understanding what security teams do and why security is so challenging based on external influences such as cyber espionage, warfare, and crime, which are currently having an adverse impact on the trust that customers have on the Internet and e-Business ...
openaire +1 more source
2009 Information Security Curriculum Development Conference, 2009
New and advanced combinations of cyber security threats are being introduced into the online world. Malware authors are forced to create more efficient software with the advancement of network security systems. Recent governmental legislation offers support to companies that operate through the use of sensitive consumer information.
openaire +1 more source
New and advanced combinations of cyber security threats are being introduced into the online world. Malware authors are forced to create more efficient software with the advancement of network security systems. Recent governmental legislation offers support to companies that operate through the use of sensitive consumer information.
openaire +1 more source
Cyber Security Awareness, Knowledge and Behavior: A Comparative Study
Journal of Computer Information Systems, 2022Moti Zwilling +2 more
exaly
Cyber security in smart cities: A review of deep learning-based applications and case studies
Sustainable Cities and Society, 2021Dongliang Chen +2 more
exaly
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
ACM Computing Surveys, 2022Ishai Rosenberg +2 more
exaly
A Survey on Network Security for Cyber–Physical Systems: From Threats to Resilient Design
IEEE Communications Surveys and Tutorials, 2022Sangjun Kim +2 more
exaly

