DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.236
1.
  • Exploring the factors that ... Exploring the factors that influence the cybersecurity behaviors of young adults
    Alanazi, Marfua; Freeman, Mark; Tootell, Holly Computers in human behavior, November 2022, 2022-11-00, Letnik: 136
    Journal Article
    Recenzirano

    Young adults aged between 18 and 30 are likely to encounter increasing cyber threats. Understanding the cybersecurity behaviors of young adults, and identifying the measures and factors that can help ...
Celotno besedilo
Dostopno za: UL
2.
  • Cyber Threats Facing Autono... Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges
    Parkinson, Simon; Ward, Paul; Wilson, Kyle ... IEEE transactions on intelligent transportation systems, 2017-Nov., 2017-11-00, Letnik: 18, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Vehicles are currently being developed and sold with increasing levels of connectivity and automation. As with all networked computing devices, increased connectivity often results in a heightened ...
Celotno besedilo
Dostopno za: UL

PDF
3.
  • Cyber Security Awareness, K... Cyber Security Awareness, Knowledge and Behavior: A Comparative Study
    Zwilling, Moti; Klien, Galit; Lesjak, Dušan ... The Journal of computer information systems, 01/2022, Letnik: 62, Številka: 1
    Journal Article
    Recenzirano

    Cyber-attacks represent a potential threat to information security. As rates of data usage and internet consumption continue to increase, cyber awareness turned to be increasingly urgent. This study ...
Celotno besedilo
Dostopno za: UL
4.
  • SCADA vulnerabilities and a... SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues
    Alanazi, Manar; Mahmood, Abdun; Chowdhury, Mohammad Jabed Morshed Computers & security, February 2023, 2023-02-00, Letnik: 125
    Journal Article
    Recenzirano
    Odprti dostop

    •SCADA systems are designed with availability as top priority.•Vulnerabilities in SCADA systems are more critical and far reaching than IT systems.•Random forest achieved the highest accuracy rate in ...
Celotno besedilo
Dostopno za: UL
5.
  • Analysis of cyber threats a... Analysis of cyber threats as a risk factor in the banking sector
    Jakovljević, Nemanja Bankarstvo, 2022, Letnik: 51, Številka: 3-4
    Journal Article
    Recenzirano
    Odprti dostop

    The banking industry faces increased risks based on cyber threats, mostly through mobile applications and web portals, and to a lesser extent through other communication channels. Cyberattacks ...
Celotno besedilo
Dostopno za: UL
6.
  • Evaluating Critical Securit... Evaluating Critical Security Issues of the IoT World: Present and Future Challenges
    Frustaci, Mario; Pace, Pasquale; Aloi, Gianluca ... IEEE internet of things journal, 08/2018, Letnik: 5, Številka: 4
    Journal Article

    Social Internet of Things (SIoT) is a new paradigm where Internet of Things (IoT) merges with social networks, allowing people and devices to interact, and facilitating information sharing. However, ...
Celotno besedilo
Dostopno za: UL
7.
  • SDN-based cyber defense: A ... SDN-based cyber defense: A survey
    Yurekten, Ozgur; Demirci, Mehmet Future generation computer systems, February 2021, 2021-02-00, Letnik: 115
    Journal Article
    Recenzirano

    The growth and ubiquity of the Internet have changed the world in numerous ways, one of which is giving rise to the necessity of being vigilant about information security and cyber threats. As threat ...
Celotno besedilo
Dostopno za: UL
8.
  • Deep learning for cyber thr... Deep learning for cyber threat detection in IoT networks: A review
    Aldhaheri, Alyazia; Alwahedi, Fatima; Ferrag, Mohamed Amine ... Internet of Things and Cyber-Physical Systems, 2024, 2024-00-00, Letnik: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The Internet of Things (IoT) has revolutionized modern tech with interconnected smart devices. While these innovations offer unprecedented opportunities, they also introduce complex security ...
Celotno besedilo
Dostopno za: UL
9.
  • DeepAK-IoT: An effective de... DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks
    Ding, Weiping; Abdel-Basset, Mohamed; Mohamed, Reda Information sciences, July 2023, 2023-07-00, Letnik: 634
    Journal Article
    Recenzirano

    •Proposing a new deep learning model for accurately detecting cyber threats to extract a feature representation and learn temporal information from cybersecurity data sequences.•Decreasing the ...
Celotno besedilo
Dostopno za: UL
10.
  • A survey of emerging threat... A survey of emerging threats in cybersecurity
    Jang-Jaccard, Julian; Nepal, Surya Journal of computer and system sciences, 08/2014, Letnik: 80, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    The exponential growth of the Internet interconnections has led to a significant growth of cyber attack incidents often with disastrous and grievous consequences. Malware is the primary choice of ...
Celotno besedilo
Dostopno za: UL

PDF
1 2 3 4 5
zadetkov: 1.236

Nalaganje filtrov