Classification of Big Data Security Based on Ontology Web Language
(Login to Download)
Learning with Errors Public Key Cryptosystem with Its Security
(Login to Download)
Towards a New Model for the Production of Civil Status Records Using Blockchain
(Login to Download)
User Station Security Protection Method Based on Random Domain Name Detection and Active Defense
(Login to Download)
A Systematic Survey for Differential Privacy Techniques in Federated Learning
(Login to Download)
Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis
(Login to Download)
Closing the Cybersecurity Skill Gap in Kenya: Curriculum Interventions in Higher Education
(Login to Download)
FastAttacker: Semantic Perturbation Functions via Three Classifications
(Login to Download)
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry
(Login to Download)
Cybersecurity Requirements for Management Information Systems
(Login to Download)
Towards Development of a Security Risk Assessment Model for Saudi Arabian Business Environment Based on the ISO/IEC 27005 ISRM Standard
(Login to Download)
A New Cyber Risk: How Teens Expose Corporations in WFH Era
(Login to Download)
A Study on the Existing Cybersecurity Policies and Strategies in Combating Increased Cybercrime in Zambia
(Login to Download)
An Extensive Study and Review of Privacy Preservation Models for the Multi-Institutional Data
(Login to Download)
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
(Login to Download)
Construction and Implementation of a Privacy-Preserving Identity-Based Encryption Architecture
(Login to Download)
Design of a Cryptographic Algorithm in the Form of an API in Order to Secure Monetary Transactions in a Supermarket
(Login to Download)
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform
(Login to Download)
Domestic Cyberterrorism & Strategic Communications: Literature Review
(Login to Download)
Forensics: Collection of Sound Digital Evidence
(Login to Download)
Hardware Security for IoT in the Quantum Era: Survey and Challenges
(Login to Download)
Majority Voting Ransomware Detection System
(Login to Download)
Security Model for Cloud Computing: Case Report of Organizational Vulnerability
(Login to Download)
Systematic Review: Analysis of Coding Vulnerabilities across Languages
(Login to Download)
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
(Login to Download)