Search Results - ("severity" OR "security")

  1. Software-Defined Networking powered by AI-driven Anomaly Detection

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  2. Security and Privacy of Wearable and Implantable Medical Devices: A Course-Based Approach to Medical Device Cybersecurity Education

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  3. Experts’ validation of the fundamental cybersecurity competency index (FCCI) using a commercial cyber range through human-generative artificial intelligence (GenAI) teaming

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. Systematic Review of Elementary Cybersecurity Education: Curriculum, Pedagogy, and Barriers

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  5. Impact of Information Security Awareness Training on Knowledge, Attitude, and Behavior: A K-12 Case Study

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  6. Higher Education Cybersecurity: A Vulnerability Assessment of the U.S. South’s Institutional Websites

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  7. Arizona’s Experiential Learning Opportunities: Regional Security Operations Centers and Cybersecurity Clinics

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  8. Prompt Engineering for GenAI in Cybersecurity Incident Response: A Multi-Platform Evaluation Based on NICE PR-IR-001

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  9. Vishing and Smishing Perpetrators and Their Victims in Nigerian Slums

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  10. Operationalizing Cyber-Routine Activities Theory for Senior Cybercrime Prevention: An Evaluation of the SHIELD Training-the-Trainer Program

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  11. Cybercrime, Vulnerability and Digital Guardianship: Opportunity Structures and Prevention in a Changing Online Landscape

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  12. A Study of Pattern of Cybercrime Abuse of Individual Internet Users in Umuahia North LGA, Abia State of South-eastern Nigeria

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  13. Policy Considerations of Open-Source Intelligence: A Study of Bellingcat's Online Investigation Patterns (2014-2024)

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  14. The Legal Response to the Intrusion into Digital Identity in Social Media

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  15. Modus Operandi and Blockchain Analysis of Romance Scams: Cryptocurrency-Driven Victimization

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  16. Navigating the Digital Frontier: New Perspectives on Cybercrime and Governance

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  17. NEED OF PARADIGM SHIFT IN CYBERSECURITY IMPLEMENTATION FOR SMALL AND MEDIUM ENTERPRISES (SMES)

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  18. Cybercrime as a Threat to the Banking Sector: A Perspective from Commercial Banks in Bangladesh

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  19. Cyber Offending among Adolescents: The Role of Thoughtfully Reflective Decision-Making and Victimization

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  20. Global Crossroads of Cybercrime: Youth, Enterprise and State Vulnerabilities in the Digital Age

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article