Full Text Available
Access Full Text at Repository
Search Results - "Computer and Cyber Security"
-
NEED OF PARADIGM SHIFT IN CYBERSECURITY IMPLEMENTATION FOR SMALL AND MEDIUM ENTERPRISES (SMES)
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
Online Article RSS Article -
Cybercrime as a Threat to the Banking Sector: A Perspective from Commercial Banks in Bangladesh
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cyber Offending among Adolescents: The Role of Thoughtfully Reflective Decision-Making and Victimization
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Global Crossroads of Cybercrime: Youth, Enterprise and State Vulnerabilities in the Digital Age
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Integrated Model of Cybercrime Dynamics: A Comprehensive Framework for Understanding Offending and Victimization in the Digital Realm
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text
-
Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theor...
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text
-
Understanding the Use of Artificial Intelligence in Cybercrime
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text
-
Book Review: Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cyberbullying During COVID-19 Pandemic: Relation to Perceived Social Isolation Among College and University Students
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text
-
The Need for a Cybersecurity Education Program for Internet Users with Limited English Proficiency: Results from a Pilot Study
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text
-
Navigating the Digital Frontier: The Intersection of Cybersecurity Challenges and Young Adult Life
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2024)Subjects: “…Computer and Cyber Security…”
Get full text
-
Ascending stepped cryptanalytic time-memory trade-off
Published in Journal of Cryptographic Engineering (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
SpoofLearner: Inducing Deceptive Results in Deep Learning SCA via Low-Order Leakage
Published in Journal of Cryptographic Engineering (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Faster $$text {GF}(2)[x]$$ polynomial multiplication using SIMD instructions
Published in Journal of Cryptographic Engineering (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
A fresh look on asymmetric crypto: accelerating WolfSSL on end-nodes processors
Published in Journal of Cryptographic Engineering (2026)Subjects: “…Computer and Cyber Security…”
Get full text