scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "Cybersecurity"

1 - 10 of 1,769 results for
 "Cybersecurity"
Results per page:

Steganography in Audio Files – COTS Software Analysis

Publication Type: Academic Journal

Source(s): International Journal of Electronics and Telecommunications, Vol vol. 69, Iss No 1, Pp 121-126 (2023)

Abstract: The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used ...

The evolution of the Human Systems and Simulation Laboratory in nuclear power research

Publication Type: Academic Journal

Source(s): Nuclear Engineering and Technology, Vol 55, Iss 3, Pp 801-813 (2023)

Abstract: The events at Three Mile Island in the United States brought about fundamental changes in the ways that simulation would be used in nuclear operations. The need for research simulators was identified to scientifically study human-centered risk and make...

An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0

Publication Type: Academic Journal

Source(s): Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 3, Pp 103-119 (2023)

Abstract: Cybersecurity attacks that target software have become profitable and popular targets for cybercriminals who consciously take advantage of web-based vulnerabilities and execute attacks that might jeopardize essential industry 5.0 features. Several mach...

Cybersecurity among University Students from Generation Z: A Comparative Study of the Undergraduate Programs in Administration and Public Accounting in two Mexican Universities

Publication Type: Academic Journal

Source(s): TEM Journal, Vol 12, Iss 1, Pp 503-511 (2023)

Abstract: The present study aimed to differentiate cybersecurity habits among Generation Z university undergraduate students of Public Accounting and Administration at two Mexican public universities and to identify relationships between the study participants’ ...

A two-stage intrusion detection method based on light gradient boosting machine and autoencoder

Publication Type: Academic Journal

Source(s): Mathematical Biosciences and Engineering, Vol 20, Iss 4, Pp 6966-6992 (2023)

Abstract: Intrusion detection systems can detect potential attacks and raise alerts on time. However, dimensionality curses and zero-day attacks pose challenges to intrusion detection systems. From a data perspective, the dimensionality curse leads to the low ef...

Functionality of the critical information infrastructure cybersecurity network

Publication Type: Academic Journal

Source(s): Bezopasnostʹ Informacionnyh Tehnologij, Vol 30, Iss 1, Pp 27-39 (2023)

Abstract: The analysis of modern approaches to countering computer attacks on critical information infrastructure (CII), presented in the form of distributed information resources, shows that there is an objective need for technological development of this direc...

Systematics of concepts in the field of information security

Publication Type: Academic Journal

Source(s): Bezopasnostʹ Informacionnyh Tehnologij, Vol 30, Iss 1, Pp 130-148 (2023)

Abstract: Based on the existing requirements for the categories of concepts, terms and definitions related to these concepts, the paper proposes a classification of concepts related to information security (IS) of objects and at the same time currently possessin...

The Application of Deep Learning Imputation and Other Advanced Methods for Handling Missing Values in Network Intrusion Detection

Publication Type: Academic Journal

Source(s): Vietnam Journal of Computer Science, Vol 10, Iss 01, Pp 1-23 (2023)

Abstract: In intelligent information systems data play a critical role. The issue of missing data is one of the commonplace problems occurring in data collected in the real world. The problem stems directly from the very nature of data collection. In this paper,...

Internetizing the battlefield

Publication Type: Academic Journal

Source(s): Tehnika, Vol 78, Iss 1, Pp 109-121 (2023)

Abstract: The purpose of this paper is to discuss how wireless technologies can be used for military operations in a much more reliable and cost-effective way. In other words, the audience was offered a strategic approach to the problem itself, and it is to be e...

A Bayesian Deep Learning Approach With Convolutional Feature Engineering to Discriminate Cyber-Physical Intrusions in Smart Grid Systems

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 11, Pp 18910-18920 (2023)

Abstract: The emergence of cyber-physical smart grid (CPSG) systems has revolutionized the traditional power grid by enabling the bidirectional energy flow between consumers and utilities. However, due to escalated information exchange between the end-users, it ...

sponsored