[HTML][HTML] Network traffic classification: Techniques, datasets, and challenges
In network traffic classification, it is important to understand the correlation between network
traffic and its causal application, protocol, or service group, for example, in facilitating lawful …
traffic and its causal application, protocol, or service group, for example, in facilitating lawful …
[HTML][HTML] COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities
Although cyber technologies benefit our society, there are also some related cybersecurity
risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and …
risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and …
Adapting legal education for the changing landscape of regional emerging economies: A dynamic framework for law majors
M Li - Journal of the Knowledge Economy, 2023 - Springer
Drawing from an exhaustive exploration of the evolving demand for legal professionals
within the dynamic landscape of regional emerging economies, this paper meticulously …
within the dynamic landscape of regional emerging economies, this paper meticulously …
Integrating cybersecurity risk management into strategic management: a comprehensive literature review
F Mızrak - Research Journal of Business and Management, 2023 - dergipark.org.tr
Purpose-This literature review aims to delve into the nexus between cybersecurity risk
management and strategic management, comprehensively exploring how organizations …
management and strategic management, comprehensively exploring how organizations …
Challenges in securing data and networks from modern cyber threats
In the era of digital transformation, organizations face an increasing array of cyber threats
that target data and network security. This study focuses on the key challenges encountered …
that target data and network security. This study focuses on the key challenges encountered …
Exploring gender dynamics in cybersecurity education: a self-determination theory and social cognitive theory perspective
The cybersecurity industry is facing two major challenges as cyber threats get more serious:
a shortage of skilled workers to defend against these attacks and a noticeable …
a shortage of skilled workers to defend against these attacks and a noticeable …
Critic-topsis-based evaluation of smart community safety: A case study of shenzhen, china
C Wang, L Wang, T Gu, J Yin, E Hao - Buildings, 2023 - mdpi.com
As a micro-unit of the smart city, smart communities have transformed residents' lives into a
world that connects physical objects. Simultaneously, though, they have brought community …
world that connects physical objects. Simultaneously, though, they have brought community …
[HTML][HTML] Strengthening cybersecurity for patient data protection in Europe
The health care sector experiences 76% of cybersecurity breaches due to basic web
application attacks, miscellaneous errors, and system intrusions, resulting in compromised …
application attacks, miscellaneous errors, and system intrusions, resulting in compromised …
Strategic cybersecurity
In the contemporary ever-evolving digital landscape, the paramount importance of fortifying
national cybersecurity for safeguarding national security is unequivocal. Cybersecurity …
national cybersecurity for safeguarding national security is unequivocal. Cybersecurity …
Towards a sustainable future: develo** a cybersecurity framework for manufacturing
Purpose This study aims to propose a cybersecurity framework that prioritizes sustainability
in the manufacturing sector by identifying necessary resources and capabilities for effective …
in the manufacturing sector by identifying necessary resources and capabilities for effective …