Cyber Risk Quantification's Role in Enterprise Threat Management: A Detailed Analysis
Sharat Ganesh
Computer Science and Engineering, 2024 14(4), pp. 78-82
Published Online: August 30, 2024
10.5923/j.computer.20241404.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF179 Views 38 Downloads
Safeguarding Your Backups: Ensuring the Security and Integrity of Your Data
Taresh Mehra
Computer Science and Engineering, 2024 14(4), pp. 75-77
Published Online: August 28, 2024
10.5923/j.computer.20241404.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF354 Views 115 Downloads
Transforming Customer Experience with Digital Voice Assistants
Alekya Jonnala
Computer Science and Engineering, 2024 14(3), pp. 67-74
Published Online: August 08, 2024
10.5923/j.computer.20241403.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF119 Views 51 Downloads
Leveraging Deep Learning Techniques for Enhanced Intrusion and Malware Detection Performance
Asmaa Ourdighi, Sarah Yamina Messaoudi, Ikram Belabed
Computer Science and Engineering, 2024 14(3), pp. 56-66
Published Online: July 06, 2024
10.5923/j.computer.20241403.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF693 Views 83 Downloads
Evaluation of a Cyber Security Resilience as a Factor for Regulating Critical Infrastructure
Grenah Sivwimi, Simon Tembo
Computer Science and Engineering, 2024 14(3), pp. 51-55
Published Online: July 06, 2024
10.5923/j.computer.20241403.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF159 Views 81 Downloads
Log Event Collector: An Automated Framework for Comprehensive Component Testing
Kirit Nimdia, Balasubrahamnya Balakrishna
Computer Science and Engineering, 2024 14(2), pp. 42-49
Published Online: April 30, 2024
10.5923/j.computer.20241402.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1064 Views 132 Downloads
Securing the Digital Backbone: An In-depth Insights into API Security Patterns and Practices
Mayank Hindka
Computer Science and Engineering, 2024 14(2), pp. 35-41
Published Online: April 25, 2024
10.5923/j.computer.20241402.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF455 Views 168 Downloads
Secured and Strategic Deployment of Mission-Critical APIs from External Caching to Cloud-Based Solutions
Balasubrahmanya Balakrishna
Computer Science and Engineering, 2024 14(2), pp. 25-34
Published Online: April 17, 2024
10.5923/j.computer.20241402.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1300 Views 172 Downloads
Design of a System to Reduce Patient Crowding at UTH
Owen Hangoma, Dr Evaristo Musonda, Ir D. Mubiligi
Computer Science and Engineering, 2024 14(1), pp. 15-23
Published Online: March 09, 2024
10.5923/j.computer.20241401.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF632 Views 178 Downloads
Seamless Integration of Third-Party Service Charges into Utility Bills: Leveraging SAP S/4HANA and SAP Cloud Connector
Khurram Qumar Siddique
Computer Science and Engineering, 2024 14(1), pp. 7-14
Published Online: March 09, 2024
10.5923/j.computer.20241401.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF57124 Views 52952 Downloads
Cloud Migration Strategy for Project Management
Falguni Mehrotra
Computer Science and Engineering, 2024 14(1), pp. 1-6
Published Online: February 27, 2024
10.5923/j.computer.20241401.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF307 Views 168 Downloads
SAP - ERP Software's Pivotal Role in Shaping Industry 4.0: Transforming the Future of Enterprise Operations
Moyinuddeen Shaik
Computer Science and Engineering, 2023 13(1), pp. 8-14
Published Online: December 23, 2023
10.5923/j.computer.20231301.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF29372 Views 19705 Downloads
Design and Implement a Crop Management System
Gregory Kakoma Chikanwa, Simon Tembo, Ir. Donat M. Ngendo
Computer Science and Engineering, 2023 13(1), pp. 1-7
Published Online: December 13, 2023
10.5923/j.computer.20231301.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1610 Views 486 Downloads
Detection of Android Adware Using Transfer Learning with Computer Vision
Kabombo Katutwa, Dani E. Banda, Julien Shabani
Computer Science and Engineering, 2022 12(1), pp. 30-38
Published Online: August 23, 2022
10.5923/j.computer.20221201.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1957 Views 604 Downloads
Cyberphysical Security Analysis of Digital Control Systems in Hydro Electric Power Grids
Lukumba Phiri, Simon Tembo
Computer Science and Engineering, 2022 12(1), pp. 15-29
Published Online: March 15, 2022
10.5923/j.computer.20221201.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1742 Views 726 Downloads
Petri Net-Based (PN) Cyber Risk Assessment and Modeling for Zambian Smart Grid (SG) ICS and SCADA Systems
Lukumba Phiri, Simon Tembo
Computer Science and Engineering, 2022 12(1), pp. 1-14
Published Online: January 21, 2022
10.5923/j.computer.20221201.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2902 Views 1105 Downloads
Enhanced Error Correcting Code on Information Extraction of Message from Digital Image Using Parity Error Correction
Tebepah T., Onuodu F. E., Okolai D. B.
Computer Science and Engineering, 2021 11(3), pp. 41-48
Published Online: December 24, 2021
10.5923/j.computer.20211103.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1678 Views 852 Downloads
Investigating the Effect of E-Learning in Science Education at GCE/O/L
Damith Wickramanayaker, Col. H. A. I. U. Hewaarachchi, Sharlene Brown
Computer Science and Engineering, 2021 11(2), pp. 28-40
Published Online: September 26, 2021
10.5923/j.computer.20211102.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1663 Views 762 Downloads
Efficiently Solving Poisson's Equation Using Simple Artificial Neural Networks
Jay P. Narain
Computer Science and Engineering, 2021 11(2), pp. 23-27
Published Online: June 26, 2021
10.5923/j.computer.20211102.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1811 Views 880 Downloads
Solution of Poisson's Equation Using Artificial Neural Networks
Jay P. Narain
Computer Science and Engineering, 2021 11(1), pp. 17-21
Published Online: June 15, 2021
10.5923/j.computer.20211101.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3263 Views 1086 Downloads