Social network security: Issues, challenges, threats, and solutions
Social networks are very popular in today's world. Millions of people use various forms of
social networks as they allow individuals to connect with friends and family, and share …
social networks as they allow individuals to connect with friends and family, and share …
[หนังสือ][B] Machine Learning for Computer and Cyber Security
BB Gupta, M Sheng - 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
Assessing the vulnerability of military personnel through open source intelligence: A case study of Lithuanian armed forces
P Malakauskis, A Juozapavičius - International Conference on Human …, 2023 - Springer
This study explores the vulnerability of Lithuanian Armed Forces soldiers to hostile
intelligence, using Open Source Intelligence (OSINT) to identify the extent of personally …
intelligence, using Open Source Intelligence (OSINT) to identify the extent of personally …
A study on Blue Team's OPSEC failures
MC Crichlow - 2020 - essay.utwente.nl
Organizations are every day expanding their networks, increasing the number of servers
and workstations in it. Such a growth expands the surface that can be targeted by malicious …
and workstations in it. Such a growth expands the surface that can be targeted by malicious …
Are Taylor's Posts Risky? Evaluating Cumulative Revelations in Online Personal Data: A persona-based tool for evaluating awareness of online risks and harms
Searching for people online is a common search task that most of us have performed at
some point or other. With so much information about people available online it is often …
some point or other. With so much information about people available online it is often …
Towards identifying, understanding and controlling cumulative revelations in social media
Every day, people post information about themselves and others on online social networks,
making such information accessible within their social circles but also, potentially, way …
making such information accessible within their social circles but also, potentially, way …
Getting creative on what will do: cyber espionage, conflict and covert action
C Bronk - Conflict and Covert Action (June 15, 2016), 2016 - papers.ssrn.com
Cyber attacks represent a new set of tools in international relations and conflict. Employment
of cyber attacks is attractive because the means necessary for subverting or compromising …
of cyber attacks is attractive because the means necessary for subverting or compromising …
Understanding effects of Operations Security (OPSEC) awareness levels of military spouses through the lenses of training and program management: A qualitative …
DW Lees - 2016 - search.proquest.com
Social networking has become an increasing popular means of 21st century communication.
With increases in deployment tempo and access to social media, military families have been …
With increases in deployment tempo and access to social media, military families have been …
[หนังสือ][B] Disaster medical assistance teams (DMATs): A case study of disaster response
NM Volpi - 2019 - search.proquest.com
Abstract Disaster Medical Assistance Teams (DMATs) are an integral part of providing
immediate medical aid to communities impacted by major disasters such as hurricanes …
immediate medical aid to communities impacted by major disasters such as hurricanes …
Privacy Preserving and Efficient Machine Learning Algorithms
E Soufleri - 2024 - search.proquest.com
Extensive data availability has catalyzed the expansion of deep learning. Such
advancements include image classification, speech, and natural language processing …
advancements include image classification, speech, and natural language processing …