Results 61 to 70 of about 37,859 (190)

Cyber Security [PDF]

open access: yesThe 5th Conference on Information and Knowledge Technology, 2013
  +6 more sources

Analysis of cyber security knowledge gaps based on cyber security body of knowledge. [PDF]

open access: yesEduc Inf Technol (Dordr), 2023
Catal C, Ozcan A, Donmez E, Kasif A.
europepmc   +1 more source

Named Entity Recognition Model Based on the Fusion of Word Vectors and Category Vectors

open access: yesIEEE Access
Named entity recognition (NER) in deep learning mode heavily relies on the processing and analysis of text vectors. This paper introduces an NER model based on deep learning techniques, emphasizing the fusion of word vectors and category vectors to ...
Yang Zhou   +3 more
doaj   +1 more source

Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems. [PDF]

open access: yesOpen Res Eur, 2023
Smrčka A   +9 more
europepmc   +1 more source

What changed in the cyber-security after COVID-19? [PDF]

open access: yesComput Secur, 2022
Kumar R, Sharma S, Vachhani C, Yadav N.
europepmc   +1 more source

In-Vehicle Communication Cyber Security: Challenges and Solutions. [PDF]

open access: yesSensors (Basel), 2022
Rathore RS   +3 more
europepmc   +1 more source

iCNN-LSTM+: A Batch-Based Incremental Ransomware Detection System Using Sysmon

open access: yesIEEE Access
Ransomware remains a persistent and evolving cyber threat, requiring adaptive and efficient detection mechanisms. This study presents a novel CNN-LSTM-based detection system that leverages Sysmon logs for real-time analysis on Windows endpoints.
Jamil Ispahany   +3 more
doaj   +1 more source

LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution. [PDF]

open access: yesSensors (Basel), 2023
Bouzidi M   +4 more
europepmc   +1 more source

Cyber security threats: A never-ending challenge for e-commerce. [PDF]

open access: yesFront Psychol, 2022
Liu X   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy