Warning: file_put_contents(cache/omni_49679cc80136123778ca58fc0b5c6c13.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cyber-Attacks (Asset-Freezing) Regulations 2019
First published in 2019...
View Book →Protecting Critical Infrastructures Against Cyber-Attack
First published in 2017...
View Book →DTIC AD1038105: Modeling Cyber Physical War Gaming
War games are simulations of what could happen in the real world. War games can serve multiple functions, such as training, testing a new system, testing existing processes, or discovering new knowled...
View Book →Human Factors Analysis of 23 Cyberattacks
First published in 2025...
View Book →DTIC ADA394215: Information Security: Weaknesses Place Commerce Data and Operations at Serious Risk
The Department of Commerce generates and disseminates some of the nation's most important economic information that is of paramount interest to U.S. businesses, policy makers, and researchers. Because...
View Book →
Cyber-Attacks and the Exploitable Imperfections of International Law
First published in 2015...
View Book →Cyber Warfare : Cyber-Attack Preparation
First published in 2021...
View Book →SECURE DATA TRANSMISSION THROUGH HYBRID CRYPTOGRAPHY AND STEGANOGRAPHIC TECHNIQUES
Secure Data Transmission Has Become A Critical Requirement In Modern Communication Systems Due To The Increasing Risks Of Cyberattacks, Data Breaches, And Unauthorized Access. Traditional Security Mec...
View Book →InfraGuard Advancing Critical Infrastructure Security through Real Time Threat Detection and Automat
Important systems like power grids, transportation networks, and water supplies are essential for modern life. However, they are at risk from cyberattacks, which can threaten national security, the ec...
View Book →
Cybersecurity in health sector: a systematic review of the literature
Currently, health centers are being affected by various cyberattacks putting at risk the confidential information of their patients and the organization because they do not have a plan or tools to hel...
View Book →DTIC AD1029813: Short Term Cyber Attacks with Long Term Effects and Degradation of Supply Chain Capa
Historically, cyber-attacks targeting computer networks have sometimes favored the attacker over the defender, resulting in great loss of information or denial of service. This thesis investigates the...
View Book →Deep Learning Approach For Intelligent Intrusion Detection System
This paper focuses on preventing cyber attacks, which are common on any device connected to the internet. In order to create an intrusion detection system (IDS) that can recognise and differentiate cy...
View Book →DTIC AD1019971: Cyberwar and B.H. Liddell Hart's Indirect Approach
This study attempts to illuminate cyberwarfare's efficacy as an indirect approach using B.H Liddell Hart's principles of the indirect approach as described in his book, Strategy. His principles are ap...
View Book →
23125 Rishika Network Intrusion Detection System with Time-Based Sequential Cluster Models Using LST
Technological development and the growth of the internet today have a positive and revolutionary impact in various areasof human life, such as banking, health, science, and more. The presence of open ...
View Book →
Leading issues in information warfare and security research. [Volume 1]
xxxiii, 205 pages : 21 cm...
View Book →Managing Threats of Cyber-Attacks on Mobile Devices
First published in 2018...
View Book →DTIC AD1026655: A Model for Real-Time Data Reputation Via Cyber Telemetry
The federal government faces a monumental task of protecting national security information, advanced warfighting capabilities and the personal information entrusted by hundreds of millions of American...
View Book →Hass & Associates Hong Kong Cybersecurity Företag, Som Söker Gemensamma Grundvalar
En obeveklig störtflod av cyberattacks har lämnat många företags trygghet officierna söker en tydligare gemensam förståelse av vad som utgör god säkerhetsstrategi, och ser att försäkringsbr...
View Book →Combating Cyberattacks Targeting the AI Ecosystem
First published in 2024...
View Book →Zero day : China's cyber wars
335 pages : 22 cm...
View Book →Adaptive Intrusion Discovery in Real-Time Networks Using Advanced Computational Intelligence
Digital plexity of cybersecurity risks has increased due to the Digital ecosystems, Internet of Things (IoT) bias, parallel computing, and fifth-generation (5G) deployment. The compass and complicatio...
View Book →DTIC AD1034155: Secure and Resilient Functional Modeling for Navy Cyber-Physical Systems
The project was started in this quarter. A kickoff meeting was held on September 26-27 in UCI, where the participants revised the proposal text together in order to ensure a common understanding of th...
View Book →Joshua D. Freilich (Political Deviance & Colonialism)
Joshua D. Frelich Culture, Conflict, Ideologically Motivated Violence, (International Political Economy, Ethno-nationalism) ---- Adamczyk, A., Freilich, J. D., & Kim, C. (2017). Religion and Crime: A ...
View Book →Cyberattacks
First published in 2023...
View Book →Cyber Polygon Report Results 2019
What is Cyber Polygon? Cyber Polygon is an international online exercise prioritising joint response to cyberthreats and the improvement of business cooperation in the fight against cybercrime...
View Book →Surviving a Cyberattack
First published in 2024...
View Book →DTIC AD1043399: PRiFi Networking for Tracking-Resistant Mobile Computing
As the most serious cyber-attack threats rapidly shift from untargeted toward increasingly targeted methods, it is becoming correspondingly more crucial for organizations to protect the identity and l...
View Book →Cybersecurity and Political Elections: Safeguarding Democracy in a Digital World
Abstract As political elections increasingly move into the digital realm, concerns over cybersecurity have become central to safeguarding democratic processes. From sophisticated hacking attempts to d...
View Book →
Proceedings of a workshop on deterring cyberattacks
First published in 2010...
View Book →DTIC AD1019319: New Tools for Cyber Terrorism
New tools used by terrorist organizations are not what we think. Yes, they still have their mortars, IEDs, VBIEDs and humans sacrifices to explode in some populated area of a country but the tools dis...
View Book →