 |
Evaluation of a Cyber Security Resilience as a Factor for Regulating Critical Infrastructure
|
Grenah Sivwimi, Simon Tembo
|
pp.
51-55
|
DOI:
10.5923/j.computer.20241403.01 527 Views 351 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Leveraging Deep Learning Techniques for Enhanced Intrusion and Malware Detection Performance
|
Asmaa Ourdighi, Sarah Yamina Messaoudi, Ikram Belabed
|
pp.
56-66
|
DOI:
10.5923/j.computer.20241403.02 989 Views 263 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Transforming Customer Experience with Digital Voice Assistants
|
Alekya Jonnala
|
pp.
67-74
|
DOI:
10.5923/j.computer.20241403.03 653 Views 283 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|