|
[1]
|
Towards Trustworthy Neuromorphic Computing
Synthesis Lectures on Engineering, Science, and Technology,
2026
DOI:10.1007/978-3-032-09586-2_2
|
|
|
|
|
[2]
|
Identification and detection of DDoS attack on smart home infrastructure using machine learning models
Scientific Reports,
2026
DOI:10.1038/s41598-025-32004-y
|
|
|
|
|
[3]
|
Machine Learning for Drone-Enabled IoT Networks
Advances in Science, Technology & Innovation,
2025
DOI:10.1007/978-3-031-80961-3_5
|
|
|
|
|
[4]
|
Machine Learning for Detecting DoS Attack: A Comparative Approach
British Journal of Computer, Networking and Information Technology,
2025
DOI:10.52589/BJCNIT-I0V0HK0Y
|
|
|
|
|
[5]
|
Multicriteria Classification Method to Evaluate the Security of Information Systems for Emerging Enterprises
Canadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l'Administration,
2025
DOI:10.1002/cjas.70019
|
|
|
|
|
[6]
|
Smart and Agile Cybersecurity for IoT and IIoT Environments
Advances in Information Security, Privacy, and Ethics,
2024
DOI:10.4018/979-8-3693-3451-5.ch013
|
|
|
|
|
[7]
|
Information Security
SSRN Electronic Journal,
2024
DOI:10.2139/ssrn.4880088
|
|
|
|
|
[8]
|
Digital Defense: Investigating Human Aspects of Cybersecurity
2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI),
2024
DOI:10.1109/SACI60582.2024.10619840
|
|
|
|
|
[9]
|
Evaluating Cybersecurity Risk: A Comprehensive Comparison of Vulnerability Scoring Methodologies
Proceedings of the 19th International Conference on Availability, Reliability and Security,
2024
DOI:10.1145/3664476.3670915
|
|
|
|
|
[10]
|
RESOURCES’ IDENTIFICATION IN EDUCATION SYSTEMS
Journal of Digital Security and Forensics,
2024
DOI:10.29121/digisecforensics.v1.i1.2024.12
|
|
|
|
|
[11]
|
Fraud Prevention, Confidentiality, and Data Security for Modern Businesses
Advances in Information Security, Privacy, and Ethics,
2023
DOI:10.4018/978-1-6684-6581-3.ch001
|
|
|
|
|
[12]
|
Research and Innovation Forum 2022
Springer Proceedings in Complexity,
2023
DOI:10.1007/978-3-031-19560-0_3
|
|
|
|
|
[13]
|
Business Education Teaching Resources Availability for Academic Staff Job Performance in Universities in South-West and South-South, Nigeria
British Journal of Education, Learning and Development Psychology,
2023
DOI:10.52589/BJELDP-N86GJFWV
|
|
|
|
|
[14]
|
The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT
Neurocomputing,
2023
DOI:10.1016/j.neucom.2023.126533
|
|
|
|
|
[15]
|
Product Security: An Overview of Concepts and Challenges
2023 IEEE 21st Jubilee International Symposium on Intelligent Systems and Informatics (SISY),
2023
DOI:10.1109/SISY60376.2023.10417906
|
|
|
|
|
[16]
|
Detection of DDoS Attack on Smart Home Infrastructure Using Artificial Intelligence Models
2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC),
2022
DOI:10.1109/CyberC55534.2022.00014
|
|
|
|
|
[17]
|
Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation
Proceedings of the 30th International Conference on Information Systems Development,
2022
DOI:10.62036/ISD.2022.20
|
|
|
|
|
[18]
|
The IoT Threat Landscape vs. Machine Learning, a.k.a. Who Attacks IoT, Why Do They Do It, and How to Prevent It?
Proceedings of the 30th International Conference on Information Systems Development,
2022
DOI:10.62036/ISD.2022.47
|
|
|
|
|
[19]
|
Bat-Inspired Optimization for Intrusion Detection Using an Ensemble Forecasting Method
Intelligent Automation & Soft Computing,
2022
DOI:10.32604/iasc.2022.024098
|
|
|
|
|
[20]
|
The cybersecurity-related ethical issues of cloud technology and how to avoid them
Proceedings of the 17th International Conference on Availability, Reliability and Security,
2022
DOI:10.1145/3538969.3544456
|
|
|
|
|
[21]
|
Image Encryption Using Modulated Chaotic Maps
2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT),
2022
DOI:10.1109/ISMSIT56059.2022.9932692
|
|
|
|
|
[22]
|
Biometric system for protecting information and improving service delivery: The case of a developing country's social security and pension organisation
Information Development,
2022
DOI:10.1177/02666669221085709
|
|
|
|
|
[23]
|
Advances in Automation III
Lecture Notes in Electrical Engineering,
2022
DOI:10.1007/978-3-030-94202-1_43
|
|
|
|
|
[24]
|
Analysis of Information Availability for Seismic and Volcanic Monitoring Systems: A Review
Sensors,
2022
DOI:10.3390/s22145186
|
|
|
|
|
[25]
|
On Cybersecurity Risk Assessment in Nuclear Power Systems
IFAC-PapersOnLine,
2022
DOI:10.1016/j.ifacol.2022.07.041
|
|
|
|
|
[26]
|
On the Availability Property and Its Metric for NPP IACS
2022 15th International Conference Management of large-scale system development (MLSD),
2022
DOI:10.1109/MLSD55143.2022.9934157
|
|
|
|
|
[27]
|
ДІЯЛЬНІСТЬ ОРГАНІВ ПУБЛІЧНОЇ ВЛАДИ УКРАЇНИ У ПРОТИДІЇ ЕПІДЕМІЇ COVID-19: ІНФОРМАЦІЙНО-БЕЗПЕКОВИЙ КОНТЕКСТ
Сучасне суспільство: політичні науки, соціологічні науки, культурологічні науки,
2021
DOI:10.34142/24130060.2021.22.1.05
|
|
|
|
|
[28]
|
Industrial Control System Availability Assessment with a Metric Based on Delay and Dependency
IFAC-PapersOnLine,
2021
DOI:10.1016/j.ifacol.2021.10.493
|
|
|
|
|
[29]
|
The Hierarchical Decision Model of cybersecurity risk assessment
2021 12th National Conference with International Participation (ELECTRONICA),
2021
DOI:10.1109/ELECTRONICA52725.2021.9513722
|
|
|
|
|
[30]
|
Big Data in the Metal Processing Value Chain: A Systematic Digitalization Approach under Special Consideration of Standardization and SMEs
Applied Sciences,
2021
DOI:10.3390/app11199021
|
|
|
|
|
[31]
|
Private Data Sharing in a Secure Cloud-based Application for Acute Stroke Care
2021 IEEE 34th International Symposium on Computer-Based Medical Systems (CBMS),
2021
DOI:10.1109/CBMS52027.2021.00039
|
|
|
|
|
[32]
|
A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications
Symmetry,
2020
DOI:10.3390/sym12030448
|
|
|
|
|
[33]
|
Web Services Security and Threats: A Systematic Literature Review
2020 International Conference on ICT for Smart Society (ICISS),
2020
DOI:10.1109/ICISS50791.2020.9307569
|
|
|
|
|
[34]
|
Information Security in the Design of Web-Based Software Systems
2020 International Conference Automatics and Informatics (ICAI),
2020
DOI:10.1109/ICAI50593.2020.9311305
|
|
|
|
|
[35]
|
Research on the Impact of Attacks on Security Characteristics
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI),
2019
DOI:10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00262
|
|
|
|
|
[36]
|
Component based metric for evaluating availability of an information system: an empirical evaluation
International Journal of Information Technology,
2018
DOI:10.1007/s41870-018-0220-2
|
|
|
|
|
[37]
|
Curating Research Data - Cyber security perspective from a nascent Brain Machine Interface Laboratory
2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON),
2018
DOI:10.1109/UEMCON.2018.8796827
|
|
|
|
|
[38]
|
Classification of Data to Enhance Data Security in Cloud Computing
2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU),
2018
DOI:10.1109/IoT-SIU.2018.8519934
|
|
|
|
|
[39]
|
Data Security Implementations in Cloud Computing: A Critical Review
2018 3rd International Conference on Information Technology Research (ICITR),
2018
DOI:10.1109/ICITR.2018.8736153
|
|
|
|
|
[40]
|
Proposed model for e-exam availability in WLAN environment
2016 International Conference on Smart Green Technology in Electrical and Information Systems (ICSGTEIS),
2016
DOI:10.1109/ICSGTEIS.2016.7885772
|
|
|
|