*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 176*number_thousands_separator*685

1

Cybersecurity in the Arab World: Technological and Socio-Political Dimensions.
Abdennadher, Slim ; Ali, Raian ; Dacier, Marc ; et al.
Communications of the ACM. Oct2025, Vol. 68 Issue 10, p72-77. 6p.

ARAB countries INTERNET security INTERCONNECTED power sys... RISK perception TRANSPORTATION managemen... DATA integrity
*Periodical*
2

Grand Challenges in Trustworthy Computing at 20: A Retrospective Look at the Second CRA Grand Challenges Conference.
DeMillo, Richard A. ; Spafford, Eugene H.
Communications of the ACM. Sep2025, Vol. 68 Issue 9, p54-61. 8p.

INTERNET security CONFERENCES & convention... COMPUTER viruses COMPUTER crimes LINK spam (Internet) DENIAL of service attack...
*Periodical*
3

Linguistic analysis of cyber threats: A philological approach to AI-driven threat detection.
Mirzakhmedova, Khulkar ; Karimov, Nodir ; Sattorova, Zilola ; et al.
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-6. 6p.

ARTIFICIAL intelligence INTERNET security HUMAN error COMPUTER network securit... RISK assessment RANSOMWARE
*Conference*
4

Cybersecurity considerations for ethnotourism destinations: A comprehensive guide.
Sayfullaev, Durbek ; Odilov, Bobir ; Karimov, Nodir ; et al.
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-7. 7p.

INTERNET security TRAVEL safety CULTURAL property TOURISTS TOURISM HERITAGE tourism
*Conference*
5

Cybersecurity challenges for ethnotourism operators: Strategies for protection.
Odilov, Bobir ; Doniyorov, Alisher ; Sayfullaev, Durbek ; et al.
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-6. 6p.

INTERNET security DIGITAL technology HERITAGE tourism LEGAL liability CYBERTERRORISM TRAVELERS
*Conference*
6

Cyber security interference security system for decentralized cloud environment using Sniffer centric transmission control technique.
Vij, Priya ; Prashant, Patil Manisha
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-8. 8p.

INTERNET security INFORMATION technology s... FLOW control (Data trans... PEER-to-peer architectur... DATA integrity DATA packeting
*Conference*
7

Machine learning techniques and bio inspired techniques based of XSS attack detection and mitigation in cyber network.
Jaleel, Uruj ; Shrivastav, Mohit
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-7. 7p.

MACHINE learning INTERNET security COMPARATIVE studies LEARNING classifier syst... WEBSITE security
*Conference*
8

AI-powered predictive maintenance for cybersecurity systems.
Haval, Abhijeet Madhukar ; Afzal, Md
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-6. 6p.

INTERNET security DENIAL of service attack... SOCIOECONOMIC factors ARTIFICIAL intelligence INFORMATION technology s... COMMUNICATION infrastruc...
*Conference*
9

E-commerce platform: Building resilient cyber defence mechanisms.
Biswas, Debarghya ; Tiwari, Ankita
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-7. 7p.

ELECTRONIC commerce INTERNET security PHISHING DATA protection ARTIFICIAL intelligence BLOCKCHAINS
*Conference*
10

AI-powered threat intelligence application in current and future trends.
Soni, Palvi ; Tandan, Gajendra
AIP Conference Proceedings. 2026, Vol. 3345 Issue 1, p1-7. 7p.

INTERNET security INTRUSION detection syst... ARTIFICIAL intelligence COMPUTER network securit... MALWARE prevention DATA transmission system...
*Conference*
11

Enhancing the security of reconfigurable cyber-physical supply chains: reconstructing vulnerable attack paths using AND/OR/QUORUM graphs.
Levner, Eugene ; Tsadikovich, Dmitry
International Journal of Production Research; Mar2026, Vol. 64 Issue 5, p1949-1967, 19p

SUPPLY chains INTERNET security
*Academic Journal*
12

Tools of the Trade: Banks, Credit Unions Leverage Evolving Technology.
BEDNAR, JOSEPH
BusinessWest. 1/19/2026, Vol. 42 Issue 19, p22-25. 4p.

DIGITAL technology BANKING industry INTERNET security CREDIT unions CONSUMER preferences FRAUD investigation
*Periodical*
13

Ransomware: Extortion Is My Business.
Marion, Jean-Yves
Communications of the ACM. May2025, Vol. 68 Issue 5, p36-47. 12p.

RANSOMWARE INTERNET security EXTORTION DATA encryption CYBERCRIMINALS DENIAL of service attack...
*Periodical*
14

Fortifying Internet of Things Security: Employing Deep Learning for Privacy‐Preserving Data Transmission in Clustered Environments.
Therasa, P. R. ; B R, Tapas Bapu ; Kumar, P. J. Sathish ; et al.
International Journal of Communication Systems. 3/10/2026, Vol. 39 Issue 4, p1-15. 15p.

INTERNET security DEEP learning MACHINE learning OPTIMIZATION algorithms CLUSTERING algorithms INTERNET of things
*Academic Journal*
15

DYNTRACE-SEC: adaptive security for containerized environments via load-aware segmentation and trust-driven policy specification and enforcement.
Ahmadpanah, Seyed Hossein ; Mirabi, Meghdad
Journal of Supercomputing. Mar2026, Vol. 82 Issue 4, p1-35. 35p.

COMPUTER security INTERNET security CLOUD computing
*Academic Journal*
16

Cybersecurity as a Pillar of Data Protection in the Digital Era: Strategies, Regulations, and Implementation in Facing Cyber Threats.
Kapoh, Harson ; Katijo, Sabian Saleh ; Putra, Khrisna Suwartono ; et al.
Cerdika: Jurnal Ilmiah Indonesia. feb2026, Vol. 6 Issue 2, p679-690. 12p.

DATA protection INTERNET security RANSOMWARE DIGITAL transformation CYBERTERRORISM GOVERNMENT regulation
*Academic Journal*
17

Weaponising AI: The New Cyber Attack Surface.
Rohozinski, Rafal ; Spirito, Chris
Survival (0039-6338). Feb2026, Vol. 68 Issue 1, p7-18. 12p.

ARTIFICIAL intelligence INTERNET security WEAPONS CYBERTERRORISM CYBERSPACE operations (M...
*Academic Journal*
18

Cyber Child‐to‐Parent Violence: Assessment and Prevalence According to Adolescents' and Parents' Reports.
Rodriguez‐Gonzalez, Sara ; Del Hoyo‐Bilbao, Joana ; Echezarraga, Ainara ; et al.
Journal of Adolescence. Feb2026, Vol. 98 Issue 2, p602-616. 15p.

ADOLESCENCE INTERNET security QUESTIONNAIRES PSYCHOMETRICS CONFIRMATORY factor anal...
*Academic Journal*
19

Deposito legale digitale: cooperazione, conservazione e nuove modalità di fruizione.
Bergamin, Giovanni ; Messina, Maurizio
JLIS.it: Italian Journal of Library, Archives & Information Science. Jan2026, Vol. 17 Issue 1, p38-60. 23p.

ITALY INTERNATIONAL cooperatio... INTERNET security TEXT mining CULTURAL property ARTIFICIAL intelligence
*Academic Journal*
20

PhishCluster: Real-Time, Density-Based Discovery of Malicious URL Campaigns from Semantic Embeddings.
Karapiperis, Dimitrios ; Feretzakis, Georgios ; Mitropoulos, Sarandis
Information. Jan2026, Vol. 17 Issue 1, p64. 21p.

INTERNET security CLUSTERING algorithms MACHINE learning REAL-time computing
*Academic Journal*

*Filter*