The organizational cybersecurity success factors: an exhaustive literature review

N Poehlmann, KM Caramancion, I Tatar, Y Li… - Advances in Security …, 2021 - Springer
To identify gaps in cybersecurity research, the authors reviewed the secondary literatures of
organizational cybersecurity posture, focusing on five factors: technology design …

Contemporary survey on effectiveness of machine and deep learning techniques for cyber security

P Suresh, K Logeswaran, P Keerthika, RM Devi… - Machine Learning for …, 2022 - Elsevier
Abstract Machine learning (ML) and deep learning (DL) techniques are applied in a broad
range of application fields where it proves its supremacy over other methods. ML and DL …

Complexity Science and Cyber Operations: A Literature Survey

B Becote, BP Rimal - Complex System Modeling and …, 2023 - ieeexplore.ieee.org
Complexity science is an interdisciplinary scientific field that analyzes systems as holistic
entities consisting of characteristics beyond the sum of a system's individual elements. This …

Investigating the drivers of cybersecurity enhancement in public organizations: The case of Jordan

MA Al‐ma'aitah - The Electronic Journal of Information Systems …, 2022 - Wiley Online Library
Electronic government systems are broadly recognized in the modern era as useful and
valid means of delivering e‐services. As the importance and prevalence of e‐government …

[PDF][PDF] The fourth industrial revolution-cyberspace mental wellbeing: Harnessing science & technology for humanity

C Boguszewicz, M Boguszewicz, Z Iqbal… - Global foundation for …, 2021 - researchgate.net
Marek is one of the world's top experts in digital transformation and cyber security, a senior
technology executive/adviser/speaker with over 30 years of experience in Technology …

Performances enhancement of fingerprint recognition system using classifiers

K Noor, T Jan, M Basheri, A Ali, RA Khalil… - IEEE …, 2018 - ieeexplore.ieee.org
Fingerprint recognition is best known and generally used as a biometric technology because
of their high acceptability, immutability, and uniqueness. A fingerprint consists of ridges and …

A security risk model for online banking system

A Dhoot, AN Nazarov… - … in the Field of on Board …, 2020 - ieeexplore.ieee.org
We are living in an era, where the security of our data has become a huge issue. The
services of cyber are the most entertaining and time-saving things in one's life. Though …

A fuzzy based mcdm methodology for risk evaluation of cyber security technologies

M Erdoğan, A Karaşan, İ Kaya, A Budak… - Intelligent and Fuzzy …, 2020 - Springer
Cyber security that also known as information technology security is to protect computers,
mobile devices, servers, electronic systems and networks from malicious digital attacks. In …

[HTML][HTML] Identification of soldiers and weapons in military armory based on comparison image processing and RFID tag

BD Lj - Vojnotehnički glasnik, 2021 - cyberleninka.ru
Introduction/purpose: The process of issuing and retrieving weapons in the military should
be fast enough and should provide immediate availability of accurate information on the …

[图书][B] Impact of training on employee actions and information security awareness in academic institutions

A Al Zaidy - 2020 - search.proquest.com
Academic institutions hold important information about students, faculty, and staff members.
Hackers target academic institutions to access this information for criminal activities such as …