Search Results - "Security"

  1. Evaluation of encrypted matching criteria using homomorphic encryption based FSM

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  2. Best interleave size of GIFT-128 on 64-bit ARM processor

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  3. A side-channel attack on a masked hardware implementation of CRYSTALS-Kyber

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  5. Application Identification with pfSense, Snort, and OpenAppID in Academic Lab Networks

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  6. Innovations and Applications of Virtual Private Networks and Sustainable Security in Society 5.0 Libraries

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  7. Adopting Artificial Intelligence: Cross-Sector Analysis of AI Adoption Risks

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  8. Enhancing Introductory Cybersecurity Learning: A Design-Based Research Case Study

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  9. Enhancing Cyber Hygiene among Communities through Experiential Cyber-Security Awareness Programs

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  10. Simulating Cyber-Resilience: The Strategic Role of the Locked Shields Exercise in Enhancing International Cyber Preparedness

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  11. Cybersecurity in Higher Education Institutions: Awareness, Policy, and Experience on Employee Behaviour

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  12. Cyber Science Education Meets Healthcare Technology

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  13. Integrating Adversarial Scenarios into LLM Security Labs: An Experience Report on a Hands-On Approach

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  14. A Review of Routing Attacks in Routing Protocol Over Low-Power and Lossy-based IoT Networks

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  15. Cybercamp: an Experience Report on the Transformations of an Intensive Cybersecurity Summer Camp for High School Students

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  16. Advancing Cybersecurity Practice: Explainable Machine Learning for Network Intrusion Detection

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  17. Software-Defined Networking powered by AI-driven Anomaly Detection

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  18. Security and Privacy of Wearable and Implantable Medical Devices: A Course-Based Approach to Medical Device Cybersecurity Education

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  19. Experts’ validation of the fundamental cybersecurity competency index (FCCI) using a commercial cyber range through human-generative artificial intelligence (GenAI) teaming

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  20. Systematic Review of Elementary Cybersecurity Education: Curriculum, Pedagogy, and Barriers

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article