Journal articles on the topic 'Cyber Defense Mechanisms'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber Defense Mechanisms.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Staszczyk, Artur. "European Parliament Position on EU Cyber Security and Defense Policy." Reality of Politics 10, no. 1 (2019): 122–33. http://dx.doi.org/10.15804/rop201908.
Full textKingsley David Onyewuchi Ofoegbu, Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Data-Driven Cyber Threat Intelligence: Leveraging Behavioral Analytics for Proactive Defense Mechanisms." Computer Science & IT Research Journal 4, no. 3 (2023): 502–24. http://dx.doi.org/10.51594/csitrj.v4i3.1501.
Full textSWAPNA, S. L., and Vidya SIVALINGAM. "AI Integration and Its Impact on Cyber Defense: A Theoretical Analysis." International Journal of Information Security and Cybercrime 14, no. 1 (2025): 76–87. https://doi.org/10.19107/ijisc.2025.01.05.
Full textAirlangga, Gregorius. "Adaptive Cyber-Defense for Unmanned Aerial Vehicles: A Modular Simulation Model with Dynamic Performance Management." Buletin Ilmiah Sarjana Teknik Elektro 5, no. 4 (2023): 505–14. https://doi.org/10.12928/biste.v5i4.9415.
Full textAbdullateef Barakat. "AI-driven threat intelligence: Strengthening cyber defense mechanisms in international cybersecurity frameworks." International Journal of Science and Research Archive 14, no. 3 (2025): 598–615. https://doi.org/10.30574/ijsra.2025.14.3.0722.
Full textNobles, Calvin, and Ian Mcandrew. "The Intersectionality of Offensive Cybersecurity and Human Factors: A Position Paper." Scientific Bulletin 28, no. 2 (2023): 215–33. http://dx.doi.org/10.2478/bsaft-2023-0022.
Full textTalekar, P. R. "Cyber-Attacks on Blockchain Systems: Vulnerabilities, Implications, and Defense Mechanisms." International Journal of Advance and Applied Research 5, no. 23 (2024): 61–64. https://doi.org/10.5281/zenodo.13604313.
Full textKommisetty, Phani Durga Nanda Kishore, Bala Maruthi Subba Rao Kuppala, and Hussain Vali Buvvaji. "Transforming Cyber Defense: Anomaly Detection and Predictive Analytics for Automated Threat Response." International Journal of Engineering and Computer Science 11, no. 08 (2022): 25585–600. http://dx.doi.org/10.18535/ijecs/v11i08.4694.
Full textPell Reddy, Rajender. "Cyber Warfare: National Security Implications and Strategic Defense Mechanisms." International Journal of Computer Trends and Technology 73, no. 4 (2025): 48–59. https://doi.org/10.14445/22312803/ijctt-v73i4p107.
Full textOgugua Chimezie Obi, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, Anthony Chigozie Anyanwu `, Shedrack Onwusinkwue, and Islam Ahmad Ibrahim Ahmad `. "COMPREHENSIVE REVIEW ON CYBERSECURITY: MODERN THREATS AND ADVANCED DEFENSE STRATEGIES." Computer Science & IT Research Journal 5, no. 2 (2024): 293–310. http://dx.doi.org/10.51594/csitrj.v5i2.758.
Full textRaghu, Ram Chowdary Velevela. "AI-Driven Cyber Security: Enhancing Threat Detection And Defense Mechanisms." Recent Trends in Cyber Criminology Research 1, no. 1 (2025): 10–14. https://doi.org/10.5281/zenodo.15009777.
Full textE. Manev, Petar. "Modern Scientific Proactive Cyber Counterintelligence Strategies for Advanced Persistent Threats Early Warning." Strategies for Policy in Science and Education-Strategii na Obrazovatelnata i Nauchnata Politika 32, no. 3 (2023): 286–97. http://dx.doi.org/10.53656/str2024-3-3-mod.
Full textRutvij, Shah, Puthraya Karthik, and Paul Josson. "AI-Driven Threat Intelligence Systems: Predictive Cybersecurity Models for Adaptive IT Defense Mechanisms." Global Journal of Engineering and Technology [GJET] 4, no. 2 (2025): 13–15. https://doi.org/10.5281/zenodo.14964173.
Full textTang, Yanni. "Exploring methods to enhance network security through artificial intelligence." Applied and Computational Engineering 36, no. 1 (2024): 140–49. http://dx.doi.org/10.54254/2755-2721/36/20230436.
Full textGoni, Ashraful, Md Umor Faruk Jahangir, and Rajarshi Roy Chowdhury. "A Study on Cyber security: Analyzing Current Threats, Navigating Complexities, and Implementing Prevention Strategies." International Journal of Research and Scientific Innovation X, no. XII (2024): 507–22. http://dx.doi.org/10.51244/ijrsi.2023.1012039.
Full textSingh, Mrs Priyanka. "Encrypted Chat Application." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35388.
Full textSun, Rongbo, Yuefei Zhu, Jinlong Fei, and Xingyu Chen. "A Survey on Moving Target Defense: Intelligently Affordable, Optimized and Self-Adaptive." Applied Sciences 13, no. 9 (2023): 5367. http://dx.doi.org/10.3390/app13095367.
Full textZarreh, Alireza, Mobin Zarreh, HungDa Wan, and Can Saygi. "Optimizing cybersecurity in cyber-physical manufacturing systems: A game-theoretic approach and quantal response equilibrium study." Journal of Future Sustainability 5, no. 3 (2025): 179–94. http://dx.doi.org/10.5267/j.jfs.2025.9.002.
Full textDr. Rajitha Kotoju and Md. Abrar Khan. "Cognitive Cyber Threat Intelligence: AI-Driven Behavioural Profiling for Proactive Security." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 156–59. https://doi.org/10.46647/10.46647/ijetms.2025.v09si01.025.
Full textOlanrewaju Oluwaseun Ajayi, Abiodun Sunday Adebayo, and Naomi Chukwurah. "Addressing security vulnerabilities in autonomous vehicles through resilient frameworks and robust cyber defense systems." Gulf Journal of Advance Business Research 3, no. 3 (2025): 825–50. https://doi.org/10.51594/gjabr.v3i3.114.
Full textSung, Kyung-Sang, and Wonshik Na. "Countermeasures Against Military Cyber Threats in Accordance with Internet of Things-Based Defense Intelligence." Journal of Computational and Theoretical Nanoscience 18, no. 5 (2021): 1572–76. http://dx.doi.org/10.1166/jctn.2021.9584.
Full textRosario, Ariel, Timothy Shives, and Mustafa Canan. "Expanding the Cyber Mission Space with the Expansion of Security Cooperation in the Era of Great Power Competition." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 427–36. https://doi.org/10.34190/iccws.20.1.3388.
Full textWan, Ming, Jiawei Li, Ying Liu, Jianming Zhao, and Jiushuang Wang. "Characteristic insights on industrial cyber security and popular defense mechanisms." China Communications 18, no. 1 (2021): 130–50. http://dx.doi.org/10.23919/jcc.2021.01.012.
Full textPramod, J. P. "Ethical Intrusion: The Strategic Role of Ethical Hacking in the Modern Cybersecurity Framework." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47045.
Full textKAZMIRUK, S., and B. LEONOV. "Legal and organizational provision of cyber protection of lie detection systems against cyber attacks under the conditions of the martial law." INFORMATION AND LAW, no. 3(46) (September 5, 2023): 135–41. http://dx.doi.org/10.37750/2616-6798.2023.3(46).287217.
Full textShelke, Palvi, and Timo Hamalainen. "Analysing Multidimensional Strategies for Cyber Threat Detection in Security Monitoring." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 780–87. http://dx.doi.org/10.34190/eccws.23.1.2123.
Full textRushika, Umesh Dhobale, and Tulshiram Gavali Shweta. "Blockchain for Secure Defense Communication Networks." Recent Trends in Control and Converter 8, no. 2 (2025): 6–21. https://doi.org/10.5281/zenodo.15348865.
Full textDwarampudi, Aiswarya, and Manas Kumar Yogi. "A Robust Machine Learning Model for Cyber Incident Classification and Prioritization." Journal of Trends in Computer Science and Smart Technology 6, no. 1 (2024): 51–66. http://dx.doi.org/10.36548/jtcsst.2024.1.004.
Full textAmmar, Alzaydi, Abedalrhman Kahtan, Nurhaliza Siti, and Ismail Mohd. "Enhancing Cyber Defense Mechanisms for Genomic Data in Personalized Healthcare Systems." Applied Science and Biotechnology Journal for Advanced Research 3, no. 5 (2024): 20–30. https://doi.org/10.5281/zenodo.13852606.
Full textKim, Jay. "Strategic Defense in Machine Learning: Assessing the Most Optimal Defense Approach to Mitigate Adversarial Cyber Attacks." Journal of Robotics and Automation Research 6, no. 2 (2025): 01–04. https://doi.org/10.33140/jrar.06.02.02.
Full textAbdullahi, Sani M., and Sanja Lazarova-Molnar. "On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances." International Journal of Information Security 24 (January 3, 2025): 53. https://doi.org/10.1007/s10207-024-00951-8.
Full textUgochukwu, Ikechukwu Okoli, Chimezie Obi Ogugua, Okechukwu Adewusi Adebunmi, and Abrahams Oluwaseun. "Machine learning in cybersecurity: A review of threat detection and defense mechanisms." World Journal of Advanced Research and Reviews 21, no. 1 (2024): 2286–95. https://doi.org/10.5281/zenodo.13367448.
Full textUgochukwu Ikechukwu Okoli, Ogugua Chimezie Obi, Adebunmi Okechukwu Adewusi, and Temitayo Oluwaseun Abrahams. "Machine learning in cybersecurity: A review of threat detection and defense mechanisms." World Journal of Advanced Research and Reviews 21, no. 1 (2024): 2286–95. http://dx.doi.org/10.30574/wjarr.2024.21.1.0315.
Full textGulhane, Vaishnavi, and Dr R. S. Bansode. "Enhancing Cyber Defense: A Comprehensive Study of DNS Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–17. http://dx.doi.org/10.55041/ijsrem36765.
Full textAlmelehy, Bashaer, Adnan Anwar, Ghalia Nassreddine, and Mohammed Maayah. "Web Application Security: An Analytical Study of Cyber Threats and Defense Mechanisms." Journal of Cyber Security and Risk Auditing 2025, no. 3 (2025): 43–62. https://doi.org/10.63180/jcsra.thestap.2025.3.5.
Full textLypka, Yurii. "Paradigm shifts in cybersecurity: a convergence of artificial intelligence, quantum computing, and neuromorphic systems." Modeling, Control and Information Technologies, no. 7 (December 7, 2024): 190–91. https://doi.org/10.31713/mcit.2024.055.
Full textDarshini, S., A. Thrisha, M. Navya Sree, G. Varshitha, and G. Thippanna. "Dark Sides of Cyber Attacks: Protection from the Assorted Cyber Attacks." Journal of Cyber Security, Privacy Issues and Challenges 4, no. 1 (2025): 14–21. https://doi.org/10.46610/jcspic.2025.v04i01.002.
Full textMohammed, Ghazi Ghader, and Zeedon Zaheer. "NeuroCyberGuard: Developing a Robust Cybersecurity Defense System through Deep Neural Learning-Based Mathematical Modeling." Journal of Smart Internet of Things 2022, no. 1 (2022): 133–45. http://dx.doi.org/10.2478/jsiot-2022-0009.
Full textGamilla, Anazel P., Thelma D. Palaoag, and Marlon A. Naagas. "Probing the depths: assessing the efficacy of the two-tier deception-driven security model." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1631. http://dx.doi.org/10.11591/ijeecs.v36.i3.pp1631-1639.
Full textAnazel, P. Gamilla Thelma D. Palaoag Marlon A. Naagas. "Probing the depths: assessing the efficacy of the two-tier deception-driven security model." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1631–39. https://doi.org/10.11591/ijeecs.v36.i3.pp1631-1639.
Full textAzmi, Nor Nashrah, Fiza Abdul Rahim, Noor Hafizah Hassan, and Nur Azfahani Ahmad. "SWOT ANALYSIS OF CYBERSECURITY VULNERABILITIES AND STRATEGIES IN RENEWABLE ENERGY SYSTEM: A CASE STUDY ON EUROPEAN WIND POWER SYSTEM." Malaysian Journal of Sustainable Environment 12, no. 2 (2025): 103–26. https://doi.org/10.24191/myse.v12i2.7072.
Full textDr., Arjun Singh Chauhan. "MODERN CYBER REGULATIONS AND TECH CRIMES IN THE 21ST CENTURY." Indian Journal of Law and Society I, no. 8 (2024): 39–53. https://doi.org/10.5281/zenodo.10644551.
Full textHasan, Kamrul, Forhad Hossain, Al Amin, Yadab Sutradhar, Israt Jahan Jeny, and Shakik Mahmud. "Enhancing Proactive Cyber Defense: A Theoretical Framework for AI-Driven Predictive Cyber Threat Intelligence." Journal of Technologies Information and Communication 5, no. 1 (2025): 33122. https://doi.org/10.55267/rtic/16176.
Full textKachan, Vadym. "Study of the cyber defense methods’ effectiveness against the TCP SYN Flood attack of the Transport Layer." Problemi telekomunìkacìj, no. 2(31) (February 16, 2023): 51–68. http://dx.doi.org/10.30837/pt.2022.2.04.
Full textMishra, Chinmayee, Pullam Bhatla Laxmi Sindhu, Pruthwiraj Mohanty, and Ayush Kumar Samrat. "DDOS Attacks and Analysis of Different Defense Mechanisms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem40061.
Full textBabajide Tolulope Familoni. "CYBERSECURITY CHALLENGES IN THE AGE OF AI: THEORETICAL APPROACHES AND PRACTICAL SOLUTIONS." Computer Science & IT Research Journal 5, no. 3 (2024): 703–24. http://dx.doi.org/10.51594/csitrj.v5i3.930.
Full textWang, Zhen, Yongjie Wang, Xinli Xiong, Qiankun Ren, and Jun Huang. "A Novel Framework for Enhancing Decision-Making in Autonomous Cyber Defense Through Graph Embedding." Entropy 27, no. 6 (2025): 622. https://doi.org/10.3390/e27060622.
Full textDr., Amit Sharma. "Advanced Cyber Defense: Machine Learning Techniques with TensorFlow." Career Point International Journal of Research (CPIJR) 1, no. 3 (2024): 123–30. https://doi.org/10.5281/zenodo.13821739.
Full textLi, Tony Yuan. "Asymmetry in the Digital Age: Cyber Deterrence Strategies for Small States." Journal of Strategic Security 17, no. 4 (2024): 71–88. https://doi.org/10.5038/1944-0472.17.4.2268.
Full textChoudhary, Rahul, Rajkumar Choudhary, and Karuna Soni. "MACHINE LEARNING ALGORITHMS FOR CYBER ATTACKS AND FRAUD DETECTION." International Journal of Technical Research & Science 9, no. 05 (2024): 17–20. http://dx.doi.org/10.30780/ijtrs.v09.i05.004.
Full text