 |
Evaluation of a Cyber Security Resilience as a Factor for Regulating Critical Infrastructure
|
Grenah Sivwimi, Simon Tembo
|
pp.
51-55
|
DOI:
10.5923/j.computer.20241403.01 490 Views 328 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Leveraging Deep Learning Techniques for Enhanced Intrusion and Malware Detection Performance
|
Asmaa Ourdighi, Sarah Yamina Messaoudi, Ikram Belabed
|
pp.
56-66
|
DOI:
10.5923/j.computer.20241403.02 958 Views 246 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Transforming Customer Experience with Digital Voice Assistants
|
Alekya Jonnala
|
pp.
67-74
|
DOI:
10.5923/j.computer.20241403.03 549 Views 249 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|