Roman Urdu Hate Speech Detection Using Transformer-Based Model for Cyber Security Applications. [PDF]
Bilal M, Khan A, Jan S, Musa S, Ali S.
europepmc +1 more source
A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists' Perspective. [PDF]
Mahler T +4 more
europepmc +1 more source
National Security 2.0: The Cyber Security of Critical Infrastructure
Ali Burak Darıcılı, Soner ÇELİK
openalex +1 more source
Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation. [PDF]
Cains MG +4 more
europepmc +1 more source
BRAT: A BRidge Attack Tool for Cyber Security Assessments of Maritime Systems
Christian Hemminghaus +2 more
openalex +1 more source
Digital Transformation Challenges: The Cyber Security Threats of Cryptocurrency Technology Use [PDF]
Sabina Baraković +1 more
openalex +1 more source
Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study. [PDF]
Nweke LO, Bokolo AJ, Mba G, Nwigwe E.
europepmc +1 more source
An intelligent cyber security phishing detection system using deep learning techniques. [PDF]
Mughaid A +5 more
europepmc +1 more source

