Growing Science » Tags cloud » Cybersecurity
Authors: Iqbal Jebril, Rafat Almaslmani, Baker Akram Falah Jarah, Mohamed Ibrahim Mugableh, Nidal Zaqeeba
DOI: 10.5267/j.uscm.2023.4.018
Keywords: Strategic Intelligence Asset Management, Competitive Advantage, Cybersecurity
Journal: USCM | Year: 2023 | Volume: 11 | Issue: 3 | Views: 1219 | Reviews: 0
Authors: Said A. Salloum, Tarek Gaber, Mohammed Amin Almaiah, Rami Shehab, Romel Al-Ali, Theyazan H.H Aldahyan
DOI: 10.5267/j.ijdns.2024.10.001
Keywords: Convolutional Neural Network (CNN), Cybersecurity, Intelligent Vehicle Systems, Network Intrusion Detection Scapy, Network Traffic Analysis, Simulation, Threat Detection
Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 1 | Views: 24 | Reviews: 0
Authors: Emad Tariq, Iman Akour, Najah Al-Shanableh, Enass Khalil Alquqa, Nidal Alzboun, Sulieman Ibraheem Shelash Al-Hawary, Muhammad Turki Alshurideh
DOI: 10.5267/j.ijdns.2023.10.016
Keywords: Cybersecurity, NIST Framework, Fraud Prevention, Commercial Banks, Jordanian banks
Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 1 | Views: 1536 | Reviews: 0
Authors: Budi Gunawan, Barito Mulyo Ratmono, Denok Kurniasih, Paulus Israwan Setyoko
DOI: 10.5267/j.ijdns.2023.7.011
Keywords: Internal Auditor, Cybersecurity, Risk Assessment, Senior Management Role, Internal Auditor Certification
Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 4 | Views: 883 | Reviews: 0
Authors: Mohammad Al Rawajbeh, Wael Alzyadat, Khalid Kaabneh, Suha Afaneh, Dima Farhan Alrwashdeh, Hamdah Samih Albayaydah, Issam Hamad AlHadid
DOI: 10.5267/j.ijdns.2023.5.001
Keywords: Internet of Things, Technology, Security Analysis, Anomaly detection system, Cybersecurity
Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 3 | Views: 656 | Reviews: 0
® 2010-2024 GrowingScience.Com