Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
Seeking Foundations for the Science of Cyber SecurityInformation systems frontiers, 2021-04, Vol.23 (2), p.263-267 [Peer Reviewed Journal]The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. ;ISSN: 1387-3326 ;EISSN: 1572-9419 ;DOI: 10.1007/s10796-021-10134-8Full text available |
|
2 |
Material Type: Book
|
Cybersecurity FundamentalsISBN: 9789390684731 ;ISBN: 9390684730 ;EISBN: 9390684749 ;EISBN: 9789390684748 ;OCLC: 1302011783Full text available |
|
3 |
Material Type: Book
|
Ethical Hacker's Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks (English Edition)ISBN: 9355512155 ;ISBN: 9789355512154 ;LCCallNum: QA76.9.A25 .R35 2022Full text available |
|
4 |
Material Type: Article
|
Cyberinsights: A Good CompanionBiomedical instrumentation & technology, 2020-11, Vol.54 (6), p.438-440 [Peer Reviewed Journal]ISSN: 0899-8205 ;EISSN: 1943-5967 ;DOI: 10.2345/0899-8205-54.6.438 ;PMID: 33339033Full text available |
|
5 |
Material Type: Article
|
An Approach of Malware Detection in Power SystemJournal of physics. Conference series, 2022-12, Vol.2401 (1), p.12032 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2401/1/012032Full text available |
|
6 |
Material Type: Article
|
M-ISDS: A Mobilized Intrusion and Spam Detection SystemSHS Web of Conferences, 2022, Vol.144, p.2014 [Peer Reviewed Journal]2022. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2261-2424 ;ISSN: 2416-5182 ;EISSN: 2261-2424 ;DOI: 10.1051/shsconf/202214402014Full text available |
|
7 |
Material Type: Article
|
Cybersecurity needs womenNature (London), 2018-03, Vol.555 (7698), p.577-580 [Peer Reviewed Journal]COPYRIGHT 2018 Nature Publishing Group ;COPYRIGHT 2018 Nature Publishing Group ;Copyright Nature Publishing Group Mar 29, 2018 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/d41586-018-03327-w ;PMID: 29595805Full text available |
|
8 |
Material Type: Book
|
Network Anomaly Detection: A Machine Learning Perspective2014 by Taylor & Francis Group, LLC ;ISBN: 146658209X ;ISBN: 9781466582095 ;ISBN: 9781466582088 ;ISBN: 1466582081 ;EISBN: 146658209X ;EISBN: 9781466582095 ;EISBN: 9780429166877 ;EISBN: 0429166877 ;DOI: 10.1201/b15088 ;OCLC: 854975437Full text available |
|
9 |
Material Type: Article
|
Retracted: Secure Data Deduplication System with Cyber Security Multikey Management in Cloud StorageSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9865384Full text available |
|
10 |
Material Type: Article
|
Retracted: Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoTSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9840321Full text available |
|
11 |
Material Type: Article
|
Retracted: A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and AnalysisSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9879467Full text available |
|
12 |
Material Type: Article
|
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithmPloS one, 2020-02, Vol.15 (2), p.e0228439-e0228439 [Peer Reviewed Journal]COPYRIGHT 2020 Public Library of Science ;2020 Fang et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2020 Fang et al 2020 Fang et al ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0228439 ;PMID: 32027693Full text available |
|
13 |
Material Type: Article
|
Normalizing the Surveillance State-Cybersecurity Cooperation and the Abraham AccordsMiddle East report (New York, N.Y. 1988), 2023-07, Vol.52 (307/308)Copyright Middle East Research and Information Project Summer/Fall 2023 ;ISSN: 0899-2851 ;EISSN: 1467-9825Full text available |
|
14 |
Material Type: Book
|
The cyber threat against IsraelCopyright Jerusalem Report Nov 27, 2023 ;ISSN: 0792-6049Full text available |
|
15 |
Material Type: Book
|
Python Ethical Hacking from Scratch : Think Like an Ethical Hacker, Avoid Detection, and Successfully Develop, Deploy, Detect, and Avoid MalwareISBN: 1838825312 ;ISBN: 9781838825317 ;EISBN: 1838825312 ;EISBN: 9781838825317 ;OCLC: 1257076860Full text available |
|
16 |
Material Type: Article
|
EMERGING TECHNOLOGIES AND IMPLICATIONS FOR FINANCIAL CYBERSECURITYInternational journal of economics and financial issues, 2020-01, Vol.10 (1), p.27-32 [Peer Reviewed Journal]2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2146-4138 ;EISSN: 2146-4138 ;DOI: 10.32479/ijefi.8844Full text available |
|
17 |
Material Type: Article
|
Ethical and social reflections on the proposed European Health Data SpaceEuropean journal of human genetics : EJHG, 2024-05, Vol.32 (5), p.498-505 [Peer Reviewed Journal]2024. The Author(s). ;The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2024 ;ISSN: 1018-4813 ;EISSN: 1476-5438 ;DOI: 10.1038/s41431-024-01543-9 ;PMID: 38355959Full text available |
|
18 |
Material Type: Article
|
Cyber-attacks on Saudi Arabia EnvironmentInternational Journal of Computer Networks and Communications Security, 2020-03, Vol.8 (3), p.26-312020. This work is published under https://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2410-0595 ;EISSN: 2308-9830 ;DOI: 10.47277/IJCNCS/8(3)1Full text available |
|
19 |
Material Type: Book
|
Penetration Testing Azure for Ethical Hackers: Develop Practical Skills to Perform Pentesting and Risk Assessment of Microsoft Azure EnvironmentsISBN: 9781839212932 ;ISBN: 1839212934 ;EISBN: 1839214708 ;EISBN: 9781839214707 ;OCLC: 1273974506Full text available |
|
20 |
Material Type: Article
|
Detection of Security Attacks on Edge Computing of IoT Devices through NS2 SimulationJournal of physics. Conference series, 2022-08, Vol.2327 (1), p.12016 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2327/1/012016Full text available |