A systematic review on security of E-commerce systems

S Badotra, A Sundas - International Journal of Applied Science and …, 2021 - gigvvy.com
With the emergence of digitalization, making the use of Internet almost for everything is not a
new trend. The maximum use of it is in the E-commerce systems. Most of the customers are …

[PDF][PDF] Islamic moderation in education and the phenomenon of cyberterrorism: a systematic literature review

S Ma'arif, H Ibda, F Ahmadi, N Qosim… - Indonesian Journal of …, 2023 - academia.edu
This article presents a systematic literature review on Islamic moderation in education to
prevent cyberterrorism in the latest literature. The method used is the systematic literature …

[图书][B] The mediated construction of reality

N Couldry, A Hepp - 2018 - books.google.com
Social theory needs to be completely rethought in a world of digital media and social media
platforms driven by data processes. Fifty years after Berger and Luckmann published their …

Machine learning for power system disturbance and cyber-attack discrimination

RCB Hink, JM Beaver, MA Buckner… - … on resilient control …, 2014 - ieeexplore.ieee.org
Power system disturbances are inherently complex and can be attributed to a wide range of
sources, including both natural and man-made events. Currently, the power system …

[图书][B] Information security management handbook

HF Tipton, M Krause - 2007 - taylorfrancis.com
Considered the gold-standard reference on information security, the Information Security
Management Handbook provides an authoritative compilation of the fundamental …

[图书][B] Terrorism in the twenty-first century

CC Combs - 2022 - taylorfrancis.com
Terrorism in the Twenty-First Century helps readers understand terrorism, responses to it,
and current trends that affect the future of this phenomenon. Putting terrorism into historical …

[图书][B] Cybersecurity in the European Union: Resilience and adaptability in governance policy

G Christou - 2016 - books.google.com
Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public
institutions and businesses are increasing. This book interrogates the European Union's …

Национальная система раннего предупреждения о компьютерном нападении

СА Петренко, ДД Ступин - 2017 - elibrary.ru
В настоящей научной монографии рассмотрены возможные решения сравнительно
новой научно-технической проблемы раннего предупреждения о компьютерном …

Cyber-terror—looming threat or phantom menace? The framing of the US cyber-threat debate

MD Cavelty - Journal of Information Technology & Politics, 2008 - Taylor & Francis
For some years, experts and government officials have warned of cyber-terrorism as a
looming threat to national security. However, if we define cyber-terror as an attack or series …

WAMS cyber-physical test bed for power system, cybersecurity study, and data mining

U Adhikari, T Morris, S Pan - IEEE Transactions on Smart Grid, 2016 - ieeexplore.ieee.org
Researchers from various cross disciplinary fields such as power systems, data science, and
cybersecurity face two distinct challenges. First, the lack of a comprehensive test bed that …