skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 88,118  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Seeking Foundations for the Science of Cyber Security
Material Type:
Article
Add to My Research

Seeking Foundations for the Science of Cyber Security

Information systems frontiers, 2021-04, Vol.23 (2), p.263-267 [Peer Reviewed Journal]

The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. ;ISSN: 1387-3326 ;EISSN: 1572-9419 ;DOI: 10.1007/s10796-021-10134-8

Full text available

2
Cybersecurity Fundamentals
Material Type:
Book
Add to My Research

Cybersecurity Fundamentals

ISBN: 9789390684731 ;ISBN: 9390684730 ;EISBN: 9390684749 ;EISBN: 9789390684748 ;OCLC: 1302011783

Full text available

3
Ethical Hacker's Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks (English Edition)
Material Type:
Book
Add to My Research

Ethical Hacker's Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks (English Edition)

ISBN: 9355512155 ;ISBN: 9789355512154 ;LCCallNum: QA76.9.A25 .R35 2022

Full text available

4
Cyberinsights: A Good Companion
Material Type:
Article
Add to My Research

Cyberinsights: A Good Companion

Biomedical instrumentation & technology, 2020-11, Vol.54 (6), p.438-440 [Peer Reviewed Journal]

ISSN: 0899-8205 ;EISSN: 1943-5967 ;DOI: 10.2345/0899-8205-54.6.438 ;PMID: 33339033

Full text available

5
An Approach of Malware Detection in Power System
Material Type:
Article
Add to My Research

An Approach of Malware Detection in Power System

Journal of physics. Conference series, 2022-12, Vol.2401 (1), p.12032 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2401/1/012032

Full text available

6
M-ISDS: A Mobilized Intrusion and Spam Detection System
Material Type:
Article
Add to My Research

M-ISDS: A Mobilized Intrusion and Spam Detection System

SHS Web of Conferences, 2022, Vol.144, p.2014 [Peer Reviewed Journal]

2022. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2261-2424 ;ISSN: 2416-5182 ;EISSN: 2261-2424 ;DOI: 10.1051/shsconf/202214402014

Full text available

7
Cybersecurity needs women
Material Type:
Article
Add to My Research

Cybersecurity needs women

Nature (London), 2018-03, Vol.555 (7698), p.577-580 [Peer Reviewed Journal]

COPYRIGHT 2018 Nature Publishing Group ;COPYRIGHT 2018 Nature Publishing Group ;Copyright Nature Publishing Group Mar 29, 2018 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/d41586-018-03327-w ;PMID: 29595805

Full text available

8
Network Anomaly Detection: A Machine Learning Perspective
Material Type:
Book
Add to My Research

Network Anomaly Detection: A Machine Learning Perspective

2014 by Taylor & Francis Group, LLC ;ISBN: 146658209X ;ISBN: 9781466582095 ;ISBN: 9781466582088 ;ISBN: 1466582081 ;EISBN: 146658209X ;EISBN: 9781466582095 ;EISBN: 9780429166877 ;EISBN: 0429166877 ;DOI: 10.1201/b15088 ;OCLC: 854975437

Full text available

9
Retracted: Secure Data Deduplication System with Cyber Security Multikey Management in Cloud Storage
Material Type:
Article
Add to My Research

Retracted: Secure Data Deduplication System with Cyber Security Multikey Management in Cloud Storage

Security and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]

Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9865384

Full text available

10
Retracted: Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT
Material Type:
Article
Add to My Research

Retracted: Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT

Security and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]

Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9840321

Full text available

11
Retracted: A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis
Material Type:
Article
Add to My Research

Retracted: A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis

Security and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]

Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9879467

Full text available

12
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
Material Type:
Article
Add to My Research

FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm

PloS one, 2020-02, Vol.15 (2), p.e0228439-e0228439 [Peer Reviewed Journal]

COPYRIGHT 2020 Public Library of Science ;2020 Fang et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2020 Fang et al 2020 Fang et al ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0228439 ;PMID: 32027693

Full text available

13
Normalizing the Surveillance State-Cybersecurity Cooperation and the Abraham Accords
Material Type:
Article
Add to My Research

Normalizing the Surveillance State-Cybersecurity Cooperation and the Abraham Accords

Middle East report (New York, N.Y. 1988), 2023-07, Vol.52 (307/308)

Copyright Middle East Research and Information Project Summer/Fall 2023 ;ISSN: 0899-2851 ;EISSN: 1467-9825

Full text available

14
The cyber threat against Israel
Material Type:
Book
Add to My Research

The cyber threat against Israel

Copyright Jerusalem Report Nov 27, 2023 ;ISSN: 0792-6049

Full text available

15
Python Ethical Hacking from Scratch : Think Like an Ethical Hacker, Avoid Detection, and Successfully Develop, Deploy, Detect, and Avoid Malware
Material Type:
Book
Add to My Research

Python Ethical Hacking from Scratch : Think Like an Ethical Hacker, Avoid Detection, and Successfully Develop, Deploy, Detect, and Avoid Malware

ISBN: 1838825312 ;ISBN: 9781838825317 ;EISBN: 1838825312 ;EISBN: 9781838825317 ;OCLC: 1257076860

Full text available

16
EMERGING TECHNOLOGIES AND IMPLICATIONS FOR FINANCIAL CYBERSECURITY
Material Type:
Article
Add to My Research

EMERGING TECHNOLOGIES AND IMPLICATIONS FOR FINANCIAL CYBERSECURITY

International journal of economics and financial issues, 2020-01, Vol.10 (1), p.27-32 [Peer Reviewed Journal]

2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2146-4138 ;EISSN: 2146-4138 ;DOI: 10.32479/ijefi.8844

Full text available

17
Ethical and social reflections on the proposed European Health Data Space
Material Type:
Article
Add to My Research

Ethical and social reflections on the proposed European Health Data Space

European journal of human genetics : EJHG, 2024-05, Vol.32 (5), p.498-505 [Peer Reviewed Journal]

2024. The Author(s). ;The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2024 ;ISSN: 1018-4813 ;EISSN: 1476-5438 ;DOI: 10.1038/s41431-024-01543-9 ;PMID: 38355959

Full text available

18
Cyber-attacks on Saudi Arabia Environment
Material Type:
Article
Add to My Research

Cyber-attacks on Saudi Arabia Environment

International Journal of Computer Networks and Communications Security, 2020-03, Vol.8 (3), p.26-31

2020. This work is published under https://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2410-0595 ;EISSN: 2308-9830 ;DOI: 10.47277/IJCNCS/8(3)1

Full text available

19
Penetration Testing Azure for Ethical Hackers: Develop Practical Skills to Perform Pentesting and Risk Assessment of Microsoft Azure Environments
Material Type:
Book
Add to My Research

Penetration Testing Azure for Ethical Hackers: Develop Practical Skills to Perform Pentesting and Risk Assessment of Microsoft Azure Environments

ISBN: 9781839212932 ;ISBN: 1839212934 ;EISBN: 1839214708 ;EISBN: 9781839214707 ;OCLC: 1273974506

Full text available

20
Detection of Security Attacks on Edge Computing of IoT Devices through NS2 Simulation
Material Type:
Article
Add to My Research

Detection of Security Attacks on Edge Computing of IoT Devices through NS2 Simulation

Journal of physics. Conference series, 2022-08, Vol.2327 (1), p.12016 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2327/1/012016

Full text available

Results 1 - 20 of 88,118  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (18,027)

Refine My Results

Creation Date 

From To
  1. Before 1974  (40)
  2. 1974 To 1985  (213)
  3. 1986 To 1997  (5,731)
  4. 1998 To 2010  (24,637)
  5. After 2010  (58,671)
  6. More options open sub menu

Subject 

  1. Computer Security  (86,410)
  2. Science & Technology  (13,175)
  3. Software  (11,106)
  4. Technology  (11,038)
  5. Internet  (10,418)
  6. Network Security  (9,658)
  7. Computer Science  (8,951)
  8. Security Management  (8,621)
  9. Data Encryption  (8,411)
  10. Cybercrime  (8,342)
  11. Privacy  (6,457)
  12. Algorithms  (6,084)
  13. Engineering  (5,777)
  14. Malware  (5,541)
  15. Computer Science, Information Systems  (5,375)
  16. Data Integrity  (5,212)
  17. Security  (4,999)
  18. Information Technology  (4,735)
  19. Infrastructure  (4,667)
  20. Internet Of Things  (4,626)
  21. More options open sub menu

Language 

  1. English  (87,159)
  2. Japanese  (518)
  3. Spanish  (303)
  4. German  (199)
  5. French  (149)
  6. Catalan  (104)
  7. Chinese  (104)
  8. Portuguese  (92)
  9. Hungarian  (69)
  10. Russian  (41)
  11. Turkish  (25)
  12. Ukrainian  (24)
  13. Swedish  (24)
  14. Czech  (17)
  15. Norwegian  (16)
  16. Polish  (15)
  17. Romanian  (14)
  18. Arabic  (8)
  19. Italian  (8)
  20. Croatian  (7)
  21. More options open sub menu

Journal Title 

  1. Arxiv  (2,951)
  2. arXiv.org  (7,100)
  3. Business World  (892)
  4. Computerworld  (1,775)
  5. Federal Computer Week  (963)
  6. Ieee Access  (1,305)
  7. Infoworld  (1,021)
  8. Network World  (1,435)
  9. New York Times  (1,197)
  10. The Washington Post  (1,961)
  11. More options open sub menu

Searching Remote Databases, Please Wait