Results 281 to 290 of about 181,953 (301)
An effectiveness of deep learning with fox optimizer-based feature selection model for securing cyberattack detection in IoT environments. [PDF]
Alkhonaini MA.
europepmc +1 more source
Information security behavior of healthcare professionals in the Sultanate of Oman based on the PMT model. [PDF]
Al Toobi A, Al Suqri M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA)
The collection and sharing of personal data has increased significantly due to the accelerated use of digital technologies and the economic phenomenon of globalization. Data protection and security is concerned with freedom itself and the possibility of individuals being subjected to potentially uncontrollable powers of mass surveillance, political ...
Matthias Drodt, Carsten Sattler
+15 more sources
The collection and sharing of personal data has increased significantly due to the accelerated use of digital technologies and the economic phenomenon of globalization. Data protection and security is concerned with freedom itself and the possibility of individuals being subjected to potentially uncontrollable powers of mass surveillance, political ...
Matthias Drodt, Carsten Sattler
+15 more sources
Cybersecurity Law: National Cybersecurity Legislations
This chapter examines cybersecurity legislations in the United States, Asia and ...Ijuo, Isaac +2 more
openaire +1 more source

