Proactive identification of cybersecurity compromises via the PROID compromise assessment framework. [PDF]
Alkhalaf AA +3 more
europepmc +1 more source
Latent topic-driven cyber intelligence model for tactics, techniques, and procedures (TTPs) detection using hybrid framework and Birch-inspired optimisation. [PDF]
Alanazi MM, Wahab AWA, Idris MYI.
europepmc +1 more source
Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things. [PDF]
Alohali MA +7 more
europepmc +1 more source
An efficient federated learning based defense mechanism for software defined network cyber threats through machine learning models. [PDF]
Amin R +5 more
europepmc +1 more source
Editorial: Machine learning for cybersecurity. [PDF]
Wickramasinghe Brahmana CS +3 more
europepmc +1 more source
Mitigating shoulder spoofing vulnerabilities in mobile payment systems: a security framework. [PDF]
Alqahtani O +5 more
europepmc +1 more source
Internalized criticism and absence of care: separate pathways from childhood abuse and neglect to dual harm via self-compassion. [PDF]
Mao Y, Xie Z, Zhang L, Wang W.
europepmc +1 more source
A multi-layered cryptographic trust reinforcement model against AI-driven threat propagation and zero-day cloud vulnerabilities in healthcare data ecosystems. [PDF]
Rani M +5 more
europepmc +1 more source
The U.S. health system vulnerabilities. [PDF]
Brantly ND.
europepmc +1 more source

