4   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis and Georgios Pangalos    
The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information s... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mario Aragonés Lozano, Israel Pérez Llopis and Manuel Esteve Domingo    
The number and the diversity in nature of daily cyber-attacks have increased in the last few years, and trends show that both will grow exponentially in the near future. Critical Infrastructures (CI) operators are not excluded from these issues; therefor... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Ibrahim Ba?abbad and Omar Batarfi    
Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim?s machine or encrypts his personal informa... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Abdul Rosyid     Pág. 144 - 151
Tarsius lariang, also called tangkasi is one of the endemic animals which is found in Lore Lindu National Park (LLNP). The threat to the tarsius population are the limitation of the distribution area, the escalation of forests exploitation, and hunting. ... ver más
Revista: Journal of Natural Resources and Environmental Management    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »