ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Technology
Social Sciences
Economy
Agronomy and forestry
Biology
Languages
Environment
Literature
Computing
all records (69)

Languages
English
German
French
Spanish

Countries
Indonesia
USA
Malaysia
Brazil
Canada
Germany
Argentina
Macedonia
India
Turkey, Turkish Republic
all records (41)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
3.112  Articles
1 of 312 pages  |  10  records  |  more records»
Information security is an important concern for governments and industry due to the increase in cyber attacks during Covid-19. The government is obliged to maintain information security in implementing an Electronic-Based Government System following Pres... see more

Cybersecurity information sharing is a proactive and collaborative measure in enhancing organizational security by exchanging cybersecurity information using a centralized repository service. However, in practice, the use of centralized services poses a t... see more

The legend of the forbidden love relationship between Joko Lancur and Dewi Amirah is much more than just an oral story. This story is still believed to be true so that it affects the socio-cultural life of the Ponorogo community in Indonesia. This study a... see more

Intrusion Detection Systems (IDS) still have unresolved problems, namely the lack of accuracy in attack detection, resulting in false-positive problems and many false alarms. Machine learning is one way that is often utilized to overcome challenges that a... see more

The sturdy and reliable payment system is one of the most important systems in the digitalization era, especially in the pandemic COVID-19 period. As part of Critical Infrastructure Information (CII), a strategy to protect the payment system is needed to ... see more

Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, such as ... see more

Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation, malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and verify data ... see more

1 of 312 pages  |  10  records  |  more records»