PSYCHOLOGICAL ASPECTS OF PROTECTING YOUNG PEOPLE FROM VARIOUS INFORMATION THREATS Journal title: International scientific journal Science and Innovation Authors: Sharapova Sabohat Djabbarovna Subject(s): Archaeology, Arts and Literature, Biological Sciences, Chemistry, Computer and Information Science, Economics, Education, Humanities, Law, Linguistics, Mathematics, Medicine, Philosophy, Physics, Psychology, Social Sciences, Architecture, Agricultural Science
THE INFLUENCE OF INFORMATION AND COMMUNICATION TECHNOLOGIES ON THE EDUCATION OF STUDENTS IN THE CONDITIONS OF MODERN GLOBALIZATION Journal title: International scientific journal Science and Innovation Authors: Khudokulov Khol Djumayevich Subject(s): Archaeology, Arts and Literature, Biological Sciences, Chemistry, Computer and Information Science, Economics, Education, Humanities, Law, Linguistics, Mathematics, Medicine, Philosophy, Physics, Psychology, Social Sciences, Architecture, Agricultural Science
The Network Security in Wireless Sensor Networks: A Review Journal title: Engineering and Technology Journal Authors: Dinesh Kumar Gupta,Dr. Deepika Pathak Subject(s): Engineering, Technology
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks Journal title: Electronic and Cyber Defense Authors: Afsaneh Tavasoli,Niloofar Orouji,Mohammad Reza Mosavi, Subject(s): Telecommunications, Electronic and Electrical Engineering, Computer Science, Interdisciplinary Applications, Computer Science, Cybernetics
The Latest Classification of Cloud Computing Security Issues: Challenges, Attacks and Solutions Journal title: Passive Defense Authors: Sajjad Gavidel, Mahdi Naghavi, Davood Asgharzadeh Subject(s): Energy, Defense, Geography, Geography, Physical, Remote Sensing
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver Journal title: Electronic and Cyber Defense Authors: Reza Soleimani Majd,S. Tohidi,Mohammad Reza Mosavi, Subject(s): Telecommunications, Electronic and Electrical Engineering, Computer Science, Interdisciplinary Applications, Computer Science, Cybernetics
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning Journal title: Electronic and Cyber Defense Authors: Mohsen Hesabi,Mahmood Deypir, Subject(s): Telecommunications, Electronic and Electrical Engineering, Computer Science, Interdisciplinary Applications, Computer Science, Cybernetics
Detecting False Data Injection Attacks in Industrial Internet of Things Using an Optimized Bidirectional Gated Recurrent Unit-Swarm Optimization Algorithm Model Journal title: Acadlore Transactions on AI and Machine Learning Authors: Nadella Sree Divya,Ramesh Vatambeti Subject(s): Computer Science, Artificial Intelligence
Routing Attack Detection Using Ensemble Deep Learning Model for IIoT Journal title: Information Dynamics and Applications Authors: Ramesh Vatambeti, Gowtham Mamidisetti Subject(s): Computer and Information Science, Algorithms and Computational Theory, Artificial Intelligence, Computer-Human Interaction, Information Technology, Computer Science, Hardware & Architecture, Computer Science, Artificial Intelligence, Computer Science, Information Systems, Computer Science, Interdisciplinary Applications, Computer Science, Cybernetics, Computer Science, Theory & Methods, Computer Science, Software Engineering
Cyber Attack Against E-Albania and Its Social, Economic and Strategic Effects Journal title: Journal of Corporate Governance, Insurance, and Risk Management Authors: Aleksander Biberaj, Enida Sheme, Alban Rakipi, Sonila Xhaferllari, Renalda Kushe, Mirjeta Alinci Subject(s): Economics, Insurance, Economic Development, Technological Change and Growth
Prevalence of Types of Stroke and Associated Risk Factors in the Department of Neurology: A Retrospective Observational Study Journal title: International Journal Of Medical Science And Clinical Research Studies Authors: Dr. Reshma R, Dr. Sreehari V Manoj, Dr. VismayaV, LijoJoseph Thomas Subject(s): Medicine
Synergistic Evaluation of Computer Network Security Using Attack Graphs and Security Event Processing Journal title: Engineering and Technology Journal Authors: Percy Piquero Mutas , Jerry I. Teleron Subject(s): Engineering, Technology
THE COMPLEX OF FACTORS IN IMPROVING THE SOFTWARE AND METHODOLOGICAL PROVISION OF "CYBER SECURITY" SCIENCE TEACHING IN THE PERIOD OF INFORMATION ATTACKS Journal title: International scientific journal Science and Innovation Authors: Muxtarov F.M. Subject(s): Archaeology, Arts and Literature, Biological Sciences, Chemistry, Computer and Information Science, Economics, Education, Humanities, Law, Linguistics, Mathematics, Medicine, Philosophy, Physics, Psychology, Social Sciences, Architecture, Agricultural Science
Evaluating Transferability of Attacks across Generative Models Journal title: Engineering and Technology Journal Authors: Rohith Vallabhaneni Subject(s): Engineering, Technology
SELECTIVE FORWARDING ATTACKS DETECTION IN WIRELESS SENSOR NETWORKS USING BLUE MONKEY OPTIMIZED GHOST NETWORK Journal title: International Journal of Data Science and Artificial Intelligence Authors: Jeyaraman Sathiamoorthy , M. Usha and P. Senthilraja Subject(s): Computer and Information Science, Engineering, Artificial Intelligence, Database Systems, Mobile Computers, Robotics and Automation, Wireless and Mobile Communication