Results 81 to 90 of about 35,083 (135)
Third-Party Access Cybersecurity Threats and Precautions: A Survey of Healthcare Delivery Organizations. [PDF]
Gellert GA +4 more
europepmc +1 more source
Unveiling personalized and gamification-based cybersecurity risks within financial institutions. [PDF]
Shahzadi A +4 more
europepmc +1 more source
A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation. [PDF]
Abo-Alian A, Youssef M, Badr NL.
europepmc +1 more source
A hybrid multi-node QKD-ECC architecture for securing IoT networks. [PDF]
Chaturvedi R +7 more
europepmc +1 more source
Safeguarding global health security amidst a scramble for Africa's minerals for the clean energy transition. [PDF]
Ajumobi O.
europepmc +1 more source
A dataset collected in real-world industrial control systems for network attack detection. [PDF]
Zhou X +9 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Factors Influencing Information Security Standards and Policies Compliance by Nigeria Bank Employees
International Congress on Information and Communication Technology, 2022It is common knowledge that cyber-attacks, theft, and internet fraud are widespread in the banking industry. This is no different in the Nigerian banking sector, where a lack of employee compliance with standards and policies exacerbates the situation ...
A. Williams, Adebowale I Ojo
semanticscholar +1 more source

