ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Computing
Education
Computing
Research
Pure sciences
Architecture and Urbanism
Economy
Biology
Social Sciences
all records (74)

Languages
English
Spanish
Portuguese
German

Countries
Indonesia
USA
Ukraine
Austria
South Africa
Romania
Brazil
Switzerland
Russia
Turkey, Turkish Republic
all records (74)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
135.229  Articles
1 of 13.524 pages  |  10  records  |  more records»
The growing number of reported cyber-attacks pose a difficult challenge to individuals, governments and organizations. Adequate protection of information systems urgently requires a cybersecurity-educated workforce trained using a curriculum that covers t... see more

This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank’s control system, which is a stage in the process of water treatme... see more

Cybersecurity information sharing is a proactive and collaborative measure in enhancing organizational security by exchanging cybersecurity information using a centralized repository service. However, in practice, the use of centralized services poses a t... see more

The rapid development and widespread adoption of electronics, modern information and cyber technologies have led to the emergence of a new range of national security and defense risks and threats that are being implemented in cyberspace and (or) across cy... see more

Cybersecurity decisions are made across a range of social, technical, economic, regulatory and political domains. There is a gap between what companies and institutions plan to do while developing their internal IS-related policies and what should be done... see more

A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decis... see more

In a world where everything is ruled by technology and software, it is very important that our personal and private files and details remain secure and undiscovered by other systems in the network. Today, the immediate way of sending any urgent informatio... see more

Introduction. The paper focuses on language means exploited by social engineers in their activities in terms of humanitarian aspects of cybersecurity. The goal of this research is to analyze the methods and techniques employed by social engineers in their... see more

Criteria and indicators of information and communication competence diagnostics development of teachers in the system of military education are substantiated. The selection of the relevant criteria and indicators is made taking into account the specifics ... see more

1 of 13.524 pages  |  10  records  |  more records»