Results 1 to 10 of about 288,624 (313)
Cyber security education is as essential as "the three R's". [PDF]
Smartphones have diffused rapidly across South African society and constitute the most dominant information and communication technologies in everyday use.
Venter IM +3 more
europepmc +5 more sources
Both cyber security and information security are frequently used interchangeably. The latter adds a new dimension to the former by considering human variables throughout the security process, making the individual the focus of attention and a potential target.
Priyatosh Jana +5 more
+8 more sources
This book focus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace and provide novel solutions in various aspects. The first part of the book focus on digital society, addressing critical infrastructure and different forms of the digitalization, strategic focus on cyber security ...
Lehto Martti, Neittaanmäki Pekka
+7 more sources
Generic attacks on small-state stream cipher constructions in the multi-user setting
Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate robust security properties while maintaining a lightweight design.
Jianfu Huang +5 more
doaj +1 more source
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access. It involves a combination of technologies, processes, and human behavior to defend against threats like malware, phishing, and hacking, with the goal of ensuring the confidentiality, integrity, and availability of ...
Sanskriti Kumari, Ruhina Prasad
+7 more sources
Anonymous data exchange is in great demand in many situations, especially in remote control systems, in which a stable, secure, and secret data channel must be established between the controlling and controlled parties to distribute control commands and ...
Kai Lin +3 more
doaj +1 more source
Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core +3 more sources
Cyber-Attacks, Cryptocurrencies and Cyber Security
This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM +3 more
openaire +5 more sources
A Survey of COVID-19 Contact Tracing Apps
The recent outbreak of COVID-19 has taken the world by surprise, forcing lockdowns and straining public health care systems. COVID-19 is known to be a highly infectious virus, and infected individuals do not initially exhibit symptoms, while some remain ...
Nadeem Ahmed +9 more
doaj +1 more source
European Cyber Security System [PDF]
Nowadays computer networks are widely spread in all spheres of human life. That is why the problem of cyber security of mankind is of great importance. Today, the European Union makes efforts to guarantee network safety in Europe by means of increase ...
Buffet, Jean-Charles +3 more
core +2 more sources

