Full Text Available
Access Full Text at Repository
Search Results - "security"
-
Evaluation of encrypted matching criteria using homomorphic encryption based FSM
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Computer and Cyber Security…”
Get full text
Online Article RSS Article -
Best interleave size of GIFT-128 on 64-bit ARM processor
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
A side-channel attack on a masked hardware implementation of CRYSTALS-Kyber
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Application Identification with pfSense, Snort, and OpenAppID in Academic Lab Networks
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Innovations and Applications of Virtual Private Networks and Sustainable Security in Society 5.0 Libraries
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Adopting Artificial Intelligence: Cross-Sector Analysis of AI Adoption Risks
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Enhancing Introductory Cybersecurity Learning: A Design-Based Research Case Study
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Enhancing Cyber Hygiene among Communities through Experiential Cyber-Security Awareness Programs
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Simulating Cyber-Resilience: The Strategic Role of the Locked Shields Exercise in Enhancing International Cyber Preparedness
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cybersecurity in Higher Education Institutions: Awareness, Policy, and Experience on Employee Behaviour
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cyber Science Education Meets Healthcare Technology
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Integrating Adversarial Scenarios into LLM Security Labs: An Experience Report on a Hands-On Approach
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
A Review of Routing Attacks in Routing Protocol Over Low-Power and Lossy-based IoT Networks
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cybercamp: an Experience Report on the Transformations of an Intensive Cybersecurity Summer Camp for High School Students
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Advancing Cybersecurity Practice: Explainable Machine Learning for Network Intrusion Detection
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Software-Defined Networking powered by AI-driven Anomaly Detection
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Security and Privacy of Wearable and Implantable Medical Devices: A Course-Based Approach to Medical Device Cybersecurity Education
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Experts’ validation of the fundamental cybersecurity competency index (FCCI) using a commercial cyber range through human-generative artificial intelligence (GenAI) teaming
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Systematic Review of Elementary Cybersecurity Education: Curriculum, Pedagogy, and Barriers
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text