-
1
Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop
Published 2025-01-01Subjects: Get full text
Article -
2
Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field
Published 2025-01-01Subjects: Get full text
Article -
3
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01Subjects: “…Cybersecurity…”
Get full text
Article -
4
CoAt-Set: Transformed coordinated attack dataset for collaborative intrusion detection simulationMendeley Data
Published 2025-04-01Subjects: “…Cybersecurity…”
Get full text
Article -
5
Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics
Published 2025-02-01Subjects: Get full text
Article -
6
Internet of Things (IoT) technologies: features, development prospects and potential threats
Published 2024-11-01Subjects: Get full text
Article -
7
Enhancing User Differentiation in the Electronic Personal Synthesis Behavior (EPSBV01) Algorithm by Adopting the Time Series Analysis
Published 2025-02-01Subjects: Get full text
Article