[PDF][PDF] Understanding cybersecurity challenges of telecommuting and video conferencing applications in the COVID-19 pandemic

K Okereafor, P Manny - Journal Homepage: http://ijmr. net. in, 2020 - researchgate.net
As a result of restrictions in mass gathering and imposition of social distancing to curtail the
spread of COVID-19, there is an unprecedented adoption of telecommuting and video …

Present and future of network security monitoring

M Fuentes-García, J Camacho… - IEEE Access, 2021 - ieeexplore.ieee.org
Network Security Monitoring (NSM) is a popular term to refer to the detection of security
incidents by monitoring the network events. An NSM system is central for the security of …

[PDF][PDF] Randomized cyber attack simulation model: a cybersecurity mitigation proposal for post covid-19 digital era

K Okereafor, O Adelaiye - International Journal of Recent …, 2020 - researchgate.net
The social distancing practices triggered by the COVID-19 pandemic have caused a huge
growth in the use of online technologies to support remote work, resulting in a sharp rise in …

[图书][B] Cybersecurity in the COVID-19 Pandemic

K Okereafor - 2021 - taylorfrancis.com
As the 2020 global lockdown became a universal strategy to control the COVID-19
pandemic, social distancing triggered a massive reliance on online and cyberspace …

[Retracted] Application of Digital Orthopedic Technology in Orthopedic Trauma

J Lin, J Ge, J Gong, H Hong… - … Mathematical Methods in …, 2022 - Wiley Online Library
In order to solve the limitation of auxiliary treatment means in the process of orthopedic
trauma surgery, and further improve the effective integration of orthopedic trauma clinical …

Applying the NIST cybersecurity framework in developing a digital forensic incident response roadmap for the security sector in Namibia

CS Puteho, A Gamundani, I Nhamu - Available at SSRN 4332936, 2022 - papers.ssrn.com
A cybersecurity response can only be effective if it is done systematically while following an
approved guide in the process. One way to achieve a sound cyber security response is by …

[PDF][PDF] A COMPREHENSIVE SURVEY OF CYBER SECURITY SPECIFIC TO CYBER DEFENCE AND DIGITAL FORENSICS

R Sharmila, N Kannan - researchgate.net
The major goal of this research is to decipher the language used in discussions on cyber
security. Cyber security has been discussed, but only as an afterthought. With an ever …