Optimizing neural networks using spider monkey optimization algorithm for intrusion detection system
The constantly changing nature of cyber threats presents unprecedented difficulties for
people, institutions, and governments across the globe. Cyber threats are a major concern in …
people, institutions, and governments across the globe. Cyber threats are a major concern in …
[PDF][PDF] NETWORK THREATS, ATTACKS AND SECURITY MEASURES: A REVIEW.
R Khan, M Hasan - International Journal of Advanced …, 2017 - pdfs.semanticscholar.org
Network security has become vital for securing sensitive and confidential information of
organizations which is being shared and transferred across global networks. Various studies …
organizations which is being shared and transferred across global networks. Various studies …
[PDF][PDF] Factors Influencing Information Security Policy Compliance Behavior in High Education Institutions: Systematic Literature Review
Information security policies and behaviors play a crucial role in organizations, particularly in
higher education institutions. These policies outline guidelines and best practices to protect …
higher education institutions. These policies outline guidelines and best practices to protect …
Effectiveness of banking card security in the Ethiopian financial sector: PCI-DSS security standard as a lens
L Lessa, D Gebrehawariat - International Journal of Industrial …, 2023 - emerald.com
Purpose This study is aimed at assessing the information security management practice with
a focus on banking card security in selected financial institutions in Ethiopia, using an …
a focus on banking card security in selected financial institutions in Ethiopia, using an …
Man in the middle attacks against SSL/TLS: Mitigation and defeat
M Alwazzeh, S Karaman… - Journal of Cyber …, 2020 - journals.riverpublishers.com
Network security and related issues have been discussed thoroughly in this paper,
especially at transport layer security network protocol, which concern with confidentiality …
especially at transport layer security network protocol, which concern with confidentiality …
[PDF][PDF] Exploring Libyan Higher Education Institutions Employees' Information Security Policy Awareness
Incidents of data breach in higher education could harm students since the exposure of
sensitive student data (eg, social security numbers) could twist students into victims of …
sensitive student data (eg, social security numbers) could twist students into victims of …
Siber savaşta mütekabiliyet
MV Güldoğan, Ş Işıklı - AJIT-e: Academic Journal of Information …, 2022 - dergipark.org.tr
Yirminci yüzyılda hızla gelişen yarı iletken teknolojilerin gündelik hayatımıza hızlı bir şekilde
entegre olması, bilginin işlenmesi ve yönetiminde kullanılan altyapı değişikliklerini de …
entegre olması, bilginin işlenmesi ve yönetiminde kullanılan altyapı değişikliklerini de …
A Comprehensive Network Security Management in Virtual Private Network Environment
SM Pedapudi, N Vadlamani - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Virtual Private Networks (VPNs) have become a communication medium for accessing
information, data exchange and flow of information. Many organizations require Intranet or …
information, data exchange and flow of information. Many organizations require Intranet or …
[PDF][PDF] Information Security
YP Surwade, HJ Patil - E-Journal of Library and Information Science, 2019 - academia.edu
With the development of the network and information technology, Information security has
become the key of information technology in 21st Century. Today we are living in …
become the key of information technology in 21st Century. Today we are living in …
[PDF][PDF] Multicriteria Decision Analysis on Information Security Policy: A Prioritization Approach
Security is the most serious concern in the digital environment. To provide a sound and firm
security policy, a multi-holistic approach must be considered when making strategic …
security policy, a multi-holistic approach must be considered when making strategic …