Search Results - "Computer and Cyber Security"

Refine Results
  1. NEED OF PARADIGM SHIFT IN CYBERSECURITY IMPLEMENTATION FOR SMALL AND MEDIUM ENTERPRISES (SMES)

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  2. Cybercrime as a Threat to the Banking Sector: A Perspective from Commercial Banks in Bangladesh

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  3. Cyber Offending among Adolescents: The Role of Thoughtfully Reflective Decision-Making and Victimization

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. Global Crossroads of Cybercrime: Youth, Enterprise and State Vulnerabilities in the Digital Age

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  5. Integrated Model of Cybercrime Dynamics: A Comprehensive Framework for Understanding Offending and Victimization in the Digital Realm

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  6. Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  7. Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theor...

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  8. Understanding the Use of Artificial Intelligence in Cybercrime

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  9. Book Review: Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  10. Cyberbullying During COVID-19 Pandemic: Relation to Perceived Social Isolation Among College and University Students

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  11. The Need for a Cybersecurity Education Program for Internet Users with Limited English Proficiency: Results from a Pilot Study

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  12. Navigating the Digital Frontier: The Intersection of Cybersecurity Challenges and Young Adult Life

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  13. Ascending stepped cryptanalytic time-memory trade-off

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  14. SpoofLearner: Inducing Deceptive Results in Deep Learning SCA via Low-Order Leakage

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  15. Faster $$text {GF}(2)[x]$$ polynomial multiplication using SIMD instructions

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  16. A fresh look on asymmetric crypto: accelerating WolfSSL on end-nodes processors

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article