CSM Podcast: 5G Security and Cybersecurity Leadership with Alex Ooi
This month Philippa Jefferies and our new editor Ana Koren talk to Alex Ooi about his career in cybersecurity and
Read moreThis month Philippa Jefferies and our new editor Ana Koren talk to Alex Ooi about his career in cybersecurity and
Read moreSupply chain attacks are on the increase. The SANS Institutes supply chain security webcast states that as of today there is a
Read moreAbstract: The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise,
Read moreAbstract: The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise,
Read moreAbstract: The complication of technological processes due to the modernization of complex technological processes aggregates with a distributed spatial infrastructure
Read moreAbstract: Today, there are many methods for detecting blocks with repetitions and redundancy in the program code. But mostly they
Read moreAbstract: When creating signature-based cybersecurity systems for network intrusion detection (NIDS), spam filtering, protection against viruses, worms, etc., developers have
Read moreAbstract: This paper is devoted to the investigation of the applicability of the Kolmogorov–Wiener filter to the prediction of heavy-tail
Read moreAbstract: Currently, the urgent task is developing the methods and tools for increasing Smart Parking software system security. The purpose
Read moreAbstract: Wireless Sensor Network (WSN) is a group of small, intelligent sensors with limited resources. WSN has limited energy restrictions,
Read more