[1]
|
Battlefield Optimization Algorithm
Expert Systems with Applications,
2025
DOI:10.1016/j.eswa.2024.126097
|
|
|
[2]
|
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability
International Journal of Information Security,
2024
DOI:10.1007/s10207-024-00863-7
|
|
|
[3]
|
Review of Intrusion Detection Systems Taxonomy, Techniques, Methods and Future Research Directions
2024 New Trends in Signal Processing (NTSP),
2024
DOI:10.23919/NTSP61680.2024.10726305
|
|
|
[4]
|
The Cybersecurity Risk Estimation Engine: A Tool for Possibility Based Risk Analysis
Computers & Security,
2022
DOI:10.1016/j.cose.2022.102752
|
|
|
[5]
|
CyberEvo
Proceedings of the Genetic and Evolutionary Computation Conference Companion,
2022
DOI:10.1145/3520304.3533999
|
|
|
[6]
|
CyberEvo
Proceedings of the Genetic and Evolutionary Computation Conference Companion,
2022
DOI:10.1145/3520304.3533999
|
|
|
[7]
|
CyberEvo
Proceedings of the Genetic and Evolutionary Computation Conference Companion,
2022
DOI:10.1145/3520304.3533999
|
|
|
[8]
|
CyberEvo
Proceedings of the Genetic and Evolutionary Computation Conference Companion,
2022
DOI:10.1145/3520304.3533999
|
|
|
[9]
|
Handbook of Research on Cyber Crime and Information Privacy
Advances in Information Security, Privacy, and Ethics,
2020
DOI:10.4018/978-1-7998-5728-0.ch025
|
|
|
[10]
|
Automating the Assessment of Networking and Security in Higher Education
Annals of Emerging Technologies in Computing,
2020
DOI:10.33166/AETiC.2020.02.001
|
|
|
[11]
|
Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
Electronics,
2020
DOI:10.3390/electronics9091460
|
|
|
[12]
|
Architecting Cyber Defense: A Survey of the Leading Cyber Reference Architectures and Frameworks
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud),
2017
DOI:10.1109/CSCloud.2017.37
|
|
|