DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 41,955
1.
  • Cyber Security: The complet... Cyber Security: The complete guide to cyber threats and protection
    David Sutton 12/2022
    eBook

    Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains ...
Full text
Available for: UL
2.
Full text
Available for: UL
3.
  • Building an International C... Building an International Cybersecurity Regime
    Johnstone, Ian; Sukumar, Arun; Trachtman, Joel 09/2023
    eBook
    Open access

    Providing a much-needed study on cybersecurity regime building, this comprehensive book is a detailed analysis of cybersecurity norm-making processes and country positions, through the lens of ...
Full text
Available for: UL
4.
  • Cyberinsights: A Good Compa... Cyberinsights: A Good Companion
    Wirth, Axel Biomedical instrumentation & technology, 2020-Nov-01, 2020-11-00, 20201101, Volume: 54, Issue: 6
    Journal Article
    Peer reviewed
Full text
Available for: UL
5.
Full text
6.
  • A Vulnerable System A Vulnerable System
    Stewart, Andrew J 2021, 2021-09-15
    eBook

    As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not ...
Full text
Available for: UL
7.
  • Cyber-attacks in the next-g... Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions
    Khan, Shah Khalid; Shiwakoti, Nirajan; Stasinopoulos, Peter ... Accident analysis and prevention, 12/2020, Volume: 148
    Journal Article
    Peer reviewed

    Display omitted •Critical areas identified for Connected & Autonomous Vehicles (CAVs) in combating cyber-attacks.•Integrated CAVs communication framework is developed for potential ...
Full text
Available for: UL
8.
Full text
Available for: UL

PDF
9.
  • FastEmbed: Predicting vulne... FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
    Fang, Yong; Liu, Yongcheng; Huang, Cheng ... PloS one, 02/2020, Volume: 15, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    In recent years, the number of vulnerabilities discovered and publicly disclosed has shown a sharp upward trend. However, the value of exploitation of vulnerabilities varies for attackers, ...
Full text
Available for: UL

PDF
10.
Full text
Available for: UL

PDF
1 2 3 4 5
hits: 41,955

Load filters