CYBER

作品数:706被引量:724H指数:10
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:朴俊杰巩汉顺曲宝林徐慧军徐寿平更多>>
相关机构:中国人民解放军总医院武汉大学四川大学国防科学技术大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金中国博士后科学基金国家重点基础研究发展计划国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Journal of Computer and Communicationsx
条 记 录,以下是1-10
视图:
排序:
AI-Powered Threat Detection in Online Communities: A Multi-Modal Deep Learning Approach
《Journal of Computer and Communications》2025年第2期155-171,共17页Ravi Teja Potla 
The fast increase of online communities has brought about an increase in cyber threats inclusive of cyberbullying, hate speech, misinformation, and online harassment, making content moderation a pressing necessity. Tr...
关键词:Multi-Model AI Deep Learning Natural Language Processing (NLP) Explainable AI (XI) Federated Learning Cyber Threat Detection LSTM CNNS 
Assessing the Gaps in Cybersecurity Resilience in Cameroon: Challenges and Opportunities for Strengthening National Cybersecurity Frameworks
《Journal of Computer and Communications》2025年第2期191-206,共16页Eyong Atem 
The digital transformation in Cameroon presents critical cybersecurity challenges that demand immediate attention and strategic intervention. This comprehensive analysis examines the evolving cybersecurity landscape i...
关键词:Cameroon Cybersecurity Gaps Sub-Sahara Africa CYBERSECURITY ANTIC CAMTEL CNPS Cybersecurity Threats AFRICA 
Big Data & DDoS ATTACKS: A Discussion of Ensemble Algorithms to Detect Cyber Attacks
《Journal of Computer and Communications》2024年第12期246-265,共20页Anja Housden-Brooks 
The use of machine learning algorithms to identify characteristics in Distributed Denial of Service (DDoS) attacks has emerged as a powerful approach in cybersecurity. DDoS attacks, which aim to overwhelm a network or...
关键词:K-Means Clustering The KNN Algorithm PySpark Ensemble Learning Methods DDoS Attacks Veracity Malicious Traffic Alert Systems 
Machine Learning Models for Heterogenous Network Security Anomaly Detection
《Journal of Computer and Communications》2024年第6期38-58,共21页Mercy Diligence Ogah Joe Essien Martin Ogharandukun Monday Abdullahi 
The increasing amount and intricacy of network traffic in the modern digital era have worsened the difficulty of identifying abnormal behaviours that may indicate potential security breaches or operational interruptio...
关键词:Cyber-Security Network Anomaly Detection Machine Learning Random Forest Decision Tree Gaussian Naive Bayes 
The Knowledge of Cyber-Security Vulnerabilities in an Institution of Higher and University Education. A Case of ISP-Bukavu (Institut Supérieur Pédagogique de Bukavu) (TTC = Teachers’ Training College)
《Journal of Computer and Communications》2023年第4期12-32,共21页Dominique Wasso Kiseki Vincent Havyarimana Therence Niyonsaba Désiré Lumonge Zabagunda Walumbuka Ilundu Wail Thabo Semong 
This study pursues the objective of analyzing and verifying the knowledge of the agents of the Institut Supérieur Pédagogique/ISP-Bukavu (TTC = Teachers’ training College) in relation to the practical flaws resulti...
关键词:Threats VULNERABILITIES Cybersecurity Anti-Spyware FIREWALL Cyber-Attack ANTIVIRUS 
A DoS Attacks Detection Aglorithm Based on Snort-BASE for Robotic Arm Control Systems
《Journal of Computer and Communications》2022年第4期1-13,共13页Nana Li Yong Wang Pengfei Shen Shuangfei Li Lin Zhou 
In response to the frequent safety accidents of industrial robots, this paper designs and implements a safety detection system for robot control. It can perform real-time security detection of robot operations on indu...
关键词:Robotic Arms Remote Control Systems Cyber Attacks BASE SNORT Security Protection 
Cybersecurity Attacks on Academic Data and Personal Information and the Mediating Role of Education and Employment
《Journal of Computer and Communications》2021年第11期77-90,共14页Ahmad Reda Alzighaibi 
The cyberspace has simultaneously presented opportunities and challenges alike for personal data security and privacy, as well as the process of research and learning. Moreover, information such as academic data, rese...
关键词:Cybersecurity Attack Technology Acceptance Model (TAM) Model Academic Data Saudi Arabia 
Resilience at the Core: Critical Infrastructure Protection Challenges, Priorities and Cybersecurity Assessment Strategies
《Journal of Computer and Communications》2021年第8期80-102,共23页Maryam Roshanaei 
The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics a...
关键词:Critical Infrastructure Protection Critical Information Infrastructure Protection CYBERSECURITY Operational Technologies Risk Management 
The Application of Epidemiology for Categorising DNS Cyber Risk Factors
《Journal of Computer and Communications》2020年第12期12-28,共17页Jessemyn Modini Timothy Lynar Elena Sitnikova Keith Joiner 
This Epidemiology can be applied to cybersecurity as a novel approach for analysing and detecting cyber threats and their risks. It provides a systematic model for the analysis of likelihood, consequence, management, ...
关键词:EPIDEMIOLOGY CYBERSECURITY Artificial Intelligence Internet of Things (IoT) Epidemiological Security Analysis Machine Learning 
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions被引量:1
《Journal of Computer and Communications》2020年第4期11-25,共15页Mohammad Rafsun Islam K. M. Aktheruzzaman 
Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect to the internet so that they can exchange data with each other. Nowadays, the IoT can be applied...
关键词:Internet of THINGS IOT IOT Architecture CYBERSECURITY ATTACKS Security Solutions 
检索报告 对象比较 聚类工具 使用帮助 返回顶部