Search Results - "Computer and Cyber Security"

  1. Integrating Adversarial Scenarios into LLM Security Labs: An Experience Report on a Hands-On Approach

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  2. A Review of Routing Attacks in Routing Protocol Over Low-Power and Lossy-based IoT Networks

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  3. Cybercamp: an Experience Report on the Transformations of an Intensive Cybersecurity Summer Camp for High School Students

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. Advancing Cybersecurity Practice: Explainable Machine Learning for Network Intrusion Detection

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  5. Software-Defined Networking powered by AI-driven Anomaly Detection

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  6. Security and Privacy of Wearable and Implantable Medical Devices: A Course-Based Approach to Medical Device Cybersecurity Education

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  7. Experts’ validation of the fundamental cybersecurity competency index (FCCI) using a commercial cyber range through human-generative artificial intelligence (GenAI) teaming

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  8. Systematic Review of Elementary Cybersecurity Education: Curriculum, Pedagogy, and Barriers

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  9. Impact of Information Security Awareness Training on Knowledge, Attitude, and Behavior: A K-12 Case Study

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  10. Higher Education Cybersecurity: A Vulnerability Assessment of the U.S. South’s Institutional Websites

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  11. Arizona’s Experiential Learning Opportunities: Regional Security Operations Centers and Cybersecurity Clinics

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  12. Prompt Engineering for GenAI in Cybersecurity Incident Response: A Multi-Platform Evaluation Based on NICE PR-IR-001

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  13. Vishing and Smishing Perpetrators and Their Victims in Nigerian Slums

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  14. Operationalizing Cyber-Routine Activities Theory for Senior Cybercrime Prevention: An Evaluation of the SHIELD Training-the-Trainer Program

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  15. Cybercrime, Vulnerability and Digital Guardianship: Opportunity Structures and Prevention in a Changing Online Landscape

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  16. A Study of Pattern of Cybercrime Abuse of Individual Internet Users in Umuahia North LGA, Abia State of South-eastern Nigeria

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  17. Policy Considerations of Open-Source Intelligence: A Study of Bellingcat's Online Investigation Patterns (2014-2024)

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  18. The Legal Response to the Intrusion into Digital Identity in Social Media

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  19. Modus Operandi and Blockchain Analysis of Romance Scams: Cryptocurrency-Driven Victimization

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  20. Navigating the Digital Frontier: New Perspectives on Cybercrime and Governance

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article