The 12th Regional Cybersecurity Conference "Cybersecurity as an enabler for Digital Economy" 28-29 October 2024 The conference aims to review the best opportunities and strategies in the field of cybersecurity industry and innovation to enhance the digital economy in the Arab and international reg...
Purpose - This study aims to determine the impacts of the Bahrain Government framework [cyber-trust program (CTP)] on the cybersecurity maturity of governm... K Shaheen,AH Zolait - 《Information & Computer Sceurity》 被引量: 0发表: 2023年 Advancing Sustainable Cybersecurity: Exploring Trends...
Fatokun Faith, B., Z.A. Long, and S. Hamid. 2024. Promoting cybersecurity knowledge via gamification: an innovative intervention design.Third International Conference on Distributed Computing and High Performance Computing (DCHPC)2024: 1–8.https://doi.org/10.1109/DCHPC60845.2024.10454080. Article...
The recent digital revolution led robots to become integrated more than ever into different domains such as agricultural, medical, industrial, military, po
Cyber Physical Systems, a New Challenge and Security Issue for the Aviation. In Proceedings of the 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 21–24 April 2021; pp. 1–5. [Google Scholar] Dave, G.; Choudhary, G.; Sihag, V.;...
The 12th Regional Cybersecurity Conference "Cybersecurity as an enabler for Digital Economy" 28-29 October 2024 The conference aims to review the best opportunities and strategies in the field of cybersecurity industry and innovation to enhance the digital economy in the Arab and international reg...
International Conference on Business and Technology 772 Accesses Abstract Digitalization in Malaysia shapes the nature of entrepreneurial opportunities and the effectiveness of governmental policies, practices, and funding to improve those opportunities. The positive impact of the digital age, in terms of ...
Yoo, J. (2014). The legality of the National Security Agency’s bulk data surveillance programs.Harvard Journal of Law & Public Policy, 37, 901. Google Scholar You, I., & Yim, K. (2010, November). Malware obfuscation techniques: A brief survey. In2010 international conference on broadband...