Results 61 to 70 of about 37,859 (190)
Analysis of cyber security knowledge gaps based on cyber security body of knowledge. [PDF]
Catal C, Ozcan A, Donmez E, Kasif A.
europepmc +1 more source
Named Entity Recognition Model Based on the Fusion of Word Vectors and Category Vectors
Named entity recognition (NER) in deep learning mode heavily relies on the processing and analysis of text vectors. This paper introduces an NER model based on deep learning techniques, emphasizing the fusion of word vectors and category vectors to ...
Yang Zhou +3 more
doaj +1 more source
Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems. [PDF]
Smrčka A +9 more
europepmc +1 more source
What changed in the cyber-security after COVID-19? [PDF]
Kumar R, Sharma S, Vachhani C, Yadav N.
europepmc +1 more source
In-Vehicle Communication Cyber Security: Challenges and Solutions. [PDF]
Rathore RS +3 more
europepmc +1 more source
iCNN-LSTM+: A Batch-Based Incremental Ransomware Detection System Using Sysmon
Ransomware remains a persistent and evolving cyber threat, requiring adaptive and efficient detection mechanisms. This study presents a novel CNN-LSTM-based detection system that leverages Sysmon logs for real-time analysis on Windows endpoints.
Jamil Ispahany +3 more
doaj +1 more source
LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution. [PDF]
Bouzidi M +4 more
europepmc +1 more source
The Persistent Need to Reform Cyber Security Services: A Case Study on France [PDF]
Houssam Zenati
openalex +1 more source
Cyber security threats: A never-ending challenge for e-commerce. [PDF]
Liu X +6 more
europepmc +1 more source

