Search Results - (insecurity OR security)

  1. Modus Operandi and Blockchain Analysis of Romance Scams: Cryptocurrency-Driven Victimization

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  2. Navigating the Digital Frontier: New Perspectives on Cybercrime and Governance

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  3. NEED OF PARADIGM SHIFT IN CYBERSECURITY IMPLEMENTATION FOR SMALL AND MEDIUM ENTERPRISES (SMES)

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. Cybercrime as a Threat to the Banking Sector: A Perspective from Commercial Banks in Bangladesh

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  5. Cyber Offending among Adolescents: The Role of Thoughtfully Reflective Decision-Making and Victimization

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  6. Global Crossroads of Cybercrime: Youth, Enterprise and State Vulnerabilities in the Digital Age

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  7. Integrated Model of Cybercrime Dynamics: A Comprehensive Framework for Understanding Offending and Victimization in the Digital Realm

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  8. Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  9. Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theor...

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  10. Understanding the Use of Artificial Intelligence in Cybercrime

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  11. Book Review: Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  12. Cyberbullying During COVID-19 Pandemic: Relation to Perceived Social Isolation Among College and University Students

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  13. The Need for a Cybersecurity Education Program for Internet Users with Limited English Proficiency: Results from a Pilot Study

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  14. Navigating the Digital Frontier: The Intersection of Cybersecurity Challenges and Young Adult Life

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  15. Ascending stepped cryptanalytic time-memory trade-off

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  16. SpoofLearner: Inducing Deceptive Results in Deep Learning SCA via Low-Order Leakage

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  17. Faster $$text {GF}(2)[x]$$ polynomial multiplication using SIMD instructions

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  18. A fresh look on asymmetric crypto: accelerating WolfSSL on end-nodes processors

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  19. Impact of Root and Tuber Expansion Programme Technology Adoption on Poverty and Food Security Status of Cassava- Farming Households in Southwestern Nigeria

    Published 2011
    Full Text Available
    Access Repository
    Thesis
  20. Contributions of non-timber forest products to household food security and income around Onigambari forest reserve, Oyo State, Nigeria

    Published 2007
    Full Text Available
    Access Repository
    Article