Dynamic multi-scale topological representation for enhancing network intrusion detection

M Zhong, M Lin, Z He - Computers & Security, 2023 - Elsevier
Network intrusion detection systems (NIDS) play a crucial role in maintaining network
security. However, current NIDS techniques tend to neglect the topological structures of …

[PDF][PDF] Techno-Prevention in Counterterrorism: Between Countering Crime and Human Rights Protection

A Masyhar, SO Emovwodo - Journal of Human Rights …, 2023 - pdfs.semanticscholar.org
In recent years, terrorism has emerged as a prominent global issue. Defense and deterrence
concepts are subject to transformation in light of evolving concerns and asymmetric threats …

Behind the digital veil: decoding the influence of HR training on information security awareness in Saudi Arabia

AM Asfahani - Cogent Business & Management, 2024 - Taylor & Francis
Abstract Amidst Saudi Arabia's digital transformation, this study investigates the impact of
HR training on information security awareness in the finance and healthcare sectors …

Deep Learning Methods to Prevent Various Cyberattacks in Cloud Environment

QK Kadhim, OF Alwan… - Revue d'Intelligence …, 2024 - search.proquest.com
Cloud computing offers many benefits, but it also presents new cybersecurity challenges that
must be addressed to ensure data protection in the cloud environment. Governments and …

Computer Network Design Using the Simple Queue Method in Maximising Network Performance in Companies

AR Basar, NH Adi, RH Gunawan - Journal of Computer-based …, 2023 - jcim.rlsociety.org
Abstract Computer Network Design Using the Simple Queue Method at CV. Ide Maju
Berkarya is made to maximise the performance of existing networks in the company. This …

Global cybersecurity: Harmonising international standards and cooperation

S Lysenko, A Liubchenko, V Коzakov… - Multidisciplinary …, 2024 - malque.pub
The growing dependence of modern society on digital technologies leads to an increase in
cyber threats, which makes the issue of cyber security particularly relevant. The problem of …

Red privada virtual y la minería de criptomonedas en el hardware de la nube pública, 2023

CA Bueno Torres - 2023 - repositorio.ucv.edu.pe
El propósito de realizar esta investigación fue lograr determinar la relación de la red privada
virtual en la minería de criptomonedas en el hardware de la nube pública, 2023. Teniendo …

[PDF][PDF] Implementación de un sistema de detección de intrusiones utilizando honeypots

J Salcedo, K Lizeth, MD Garcia Romero… - repositorio.espe.edu.ec
Certifico que el trabajo de integración curricular:“Implementación de un sistema de
detección de intrusiones utilizando honeypots especializados en el procesamiento de …