Search Results - ("severity" OR "security")

  1. Integrated Model of Cybercrime Dynamics: A Comprehensive Framework for Understanding Offending and Victimization in the Digital Realm

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  2. Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  3. Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theor...

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. Understanding the Use of Artificial Intelligence in Cybercrime

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  5. Book Review: Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  6. Cyberbullying During COVID-19 Pandemic: Relation to Perceived Social Isolation Among College and University Students

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  7. The Need for a Cybersecurity Education Program for Internet Users with Limited English Proficiency: Results from a Pilot Study

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  8. Navigating the Digital Frontier: The Intersection of Cybersecurity Challenges and Young Adult Life

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  9. Ascending stepped cryptanalytic time-memory trade-off

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  10. SpoofLearner: Inducing Deceptive Results in Deep Learning SCA via Low-Order Leakage

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  11. Faster $$text {GF}(2)[x]$$ polynomial multiplication using SIMD instructions

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  12. A fresh look on asymmetric crypto: accelerating WolfSSL on end-nodes processors

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  13. Climate change symposium sur de changement climatique 2011

    Published 2011
    Subjects: “…Food Security…”
    Full Text Available
    Access Repository
    Article
  14. Conference proceedings

    Published 2024
    Subjects: “…Food security…”
    Full Text Available
    Access Repository
    Article
  15. Inter-parental conflict, parent-child relationship on emotional security of school-going adolescents in Ibadan South-West Local Government Area, Ibadan, Oyo State

    Published 2016-12
    Subjects: “…Emotional security…”
    Full Text Available
    Access Repository
    Article
  16. Needs assessment of youths Involved in fish farming in Ibadan metropolis, Oyo State, Nigeria

    Published 2022
    Subjects: “…Food security…”
    Full Text Available
    Access Repository
    Article
  17. Ensuring health security for Nigerians by 2050: Closing equity gaps in reproductive health.

    Published 2019
    Subjects: “…Health security…”
    Full Text Available
    Access Repository
    Article
  18. Ensuring health security for Nigerians by 2050: closing the equity gaps in reproductive health

    Published 2019
    Subjects: “…Health security…”
    Full Text Available
    Access Repository
    Article
  19. Ensuring health security for Nigerians by 2050: closing the equity gaps in reproductive health

    Published 2019
    Subjects: “…Health security…”
    Full Text Available
    Access Repository
    Article
  20. Crimes incidence and control in an academic library: implications for management and policy

    Published 2010-06
    Subjects: “…Security…”
    Full Text Available
    Access Repository
    Article