Export 20966 results:
Color-Optimized One-Pixel Attack Against Digital Pathology Images In Proceedings of the 29th Conference of Open Innovations Association FRUCT. Vol. 29.1. Tampere, Finland, 2021.
Comparative Analysis of Counter-Terrorism Efforts of NATO and the Shanghai Cooperation Organization." Information & Security: An International Journal 48, no. 1 (2021): 115-134."
Comparative Analysis of Models for Assessing the Maturity of Cybersecurity Capabilities In IT4Sec Reports., 2021.
A Comparative Study of Different Search and Indexing Tools for Big Data." Jordanian Journal of Computers and Information Technology (JJCIT) (2021)."
Comparison of the Regulations on Communication Privacy between EU and Japan: Toward Reinforcement of Japan’s Communication Privacy." Information & Security: An International Journal 48, no. 1 (2021): 84-94."
Concepts in Networks and Communication Security and Graph Theory." Information & Security: An International Journal 50, no. 2 (2021): 205-210 ."
A Conceptual Model for Resilience in the field of Secuirty In IT4Sec Reports., 2021.
Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness." Computers & Security 108 (2021)."
Construction of The E-Government -Case Study of Japan and Estonia." International Journal for Applied Information Management 1, no. 3 (2021): 145-151."
The Conundrum of Pak-Afghan Border: A Historical Perspective." Pakistan Journal of International Affairs (2021)."
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19." Information & Security: An International Journal 48, no. 2 (2021): 213-225."
Copresence networks: criminals in their environment." Social Network Analysis and Mining 11 (2021): 85."
Core Competencies Identification and Development: Evidence from Oil and Gas Exploration Company." In SPE Annual Technical Conference and Exhibition. Dubai, UAE, 2021."
Correlation of Cyber Threat Intelligence Data Across Global Honeypots In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). NV, USA: IEEE Institute of Electrical and Electronics Engineers, 2021.
Corruption as a Cybersecurity Threat in the New World Order." Connections: The Quarterly Journal 20, no. 2 (2021): 75-87."
Countering Crime, Hate Speech, and Disinformation in Cyberspace." Connections: The Quarterly Journal 20, no. 2 (2021): 5-8."
The COVID-19 pandemic and the effectiveness of education in military universities in Poland." In Remote Learning in Times of Pandemic. Routledge, 2021."
Credit card fraud detection using asexual reproduction optimization." Kybernetes (2021)."
Credit Card Fraud Transaction Classification Using Improved Class Balancing and Support Vector Machines In Recent Innovations in Computing: Proceedings of ICRIC 2021. Vol. 2. Springer Nature, 2021.
The Current State of Cybersecurity Readiness in Nigeria Organizations." International Journal of Multidisciplinary and Current Educational Research 3, no. 1 (2021): 154-162."
Cyber Resilience Strategy: A Key guide to enterprise operations in digital age." NBTC Journal (2021)."
Cyber Security Planning Guide . San Jose, CA: NBU Company, 2021.
Cyber Skills Gaps – A Systematic Review of the Academic Literature." Connections: The Quarterly Journal 20, no. 2 (2021): 33-45."