3   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Sakshi Chhabra,Ashutosh Kumar Singh     Pág. 296 - 307
Cloud Computing has achieved long dreamed vision of developments in IT industry such as remote storage services or privacy solutions. It is a data storage model in which data is preserved, controlled and presented over the network users. However, cloud s... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Dania Aljeaid, Amal Alzhrani, Mona Alrougi and Oroob Almalki    
Phishing attacks are cybersecurity threats that have become increasingly sophisticated. Phishing is a cyberattack that can be carried out using various approaches and techniques. Usually, an attacker uses trickery as well as fraudulent and disguised mean... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shaked Delarea and Yossi Oren    
Fault attacks are traditionally considered under a threat model that assumes the device under test is in the possession of the attacker. We propose a variation on this model. In our model, the attacker integrates a fault injection circuit into a maliciou... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »