Cyber-intimate partner violence (C-IPV) and its risk factors among women in Malaysia. [PDF]
Ahmad Y, Razali S.
europepmc +1 more source
Cyber Threats to Hospitals and Critical Infrastructure in Times of COVID-19 Pandemic
Tokat Y.
europepmc +1 more source
Integration of metaheuristic based feature selection with ensemble representation learning models for privacy aware cyberattack detection in IoT environments. [PDF]
Karthikeyan M +6 more
europepmc +1 more source
Establishing forensic DNA databases in Africa. [PDF]
Smith JH, Horne JS.
europepmc +1 more source
Topic recognition and refined evolution path analysis of literature in the field of cybersecurity. [PDF]
Zhu Y, Li Z, Li T, Jiang L.
europepmc +1 more source
Nursing Students' Experiences With Artificial Intelligence: A Qualitative Study on Education, Clinical Practice, and Future Expectations. [PDF]
Dagcan Sahin N, Yildirim M.
europepmc +1 more source
Examining older adults' vulnerability to online health scams: insights from routine activity theory. [PDF]
Chen H, He M, Xu X, Atkin D.
europepmc +1 more source
Two-Tier heuristic search for ransomware-as-a-service based cyberattack défense analysis using explainable Bayesian deep learning model. [PDF]
Almuflih AS.
europepmc +1 more source
Related searches:
Cybercrime Investigation Model
2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2023With each passing day, individuals, organizations, and even governmental entities are confronted with an escalating incidence of cybercrimes. Faced with limited resources and the increasing complexity of cyberattacks, organizations often find themselves incapable of detecting and preventing such malicious actions and necessitating investigative efforts
Andrey Chechulin, Maxim Gorda
openaire +1 more source

