57   Artículos

« Anterior     Página: 1 de 3     Siguiente »

 
en línea
Ishaani Priyadarshini    
The swift proliferation of the Internet of Things (IoT) devices in smart city infrastructures has created an urgent demand for robust cybersecurity measures. These devices are susceptible to various cyberattacks that can jeopardize the security and funct... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Huda Lughbi, Mourad Mars and Khaled Almotairi    
The pervasive reach of social media like the X platform, formerly known as Twitter, offers unique opportunities for real-time analysis of cyberattack developments. By parsing and classifying tweets related to cyberattacks, we can glean valuable insights ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara and Ahmad K. Al Hwaitat    
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Olga Tushkanova, Diana Levshun, Alexander Branitskiy, Elena Fedorchenko, Evgenia Novikova and Igor Kotenko    
Cyberattacks on cyber-physical systems (CPS) can lead to severe consequences, and therefore it is extremely important to detect them at early stages. However, there are several challenges to be solved in this area; they include an ability of the security... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
N?guessan Yves-Roland Douha, Masahiro Sasabe, Yuzo Taenaka and Youki Kadobayashi    
In the digital era, smart-home users face growing threats from cyberattacks that threaten their privacy and security. Hence, it is essential for smart-home users to prioritize cybersecurity education and training to secure their homes. Despite this, the ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuhang Zhang and Ming Ni    
With the increasing deployment of advanced sensing and measurement devices, the modern distribution system is evolved into a cyber-physical power distribution system (CPPDS). Due to the extensive application of information and communication technology, C... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Srinath Perera, Xiaohua Jin, Alana Maurushat and De-Graft Joe Opoku    
The COVID-19 pandemic has brought massive online activities and increased cybersecurity incidents and cybercrime. As a result of this, the cyber reputation of organisations has also received increased scrutiny and global attention. Due to increased cyber... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain and Walton Wider    
This study examines the factors influencing government employees? cybersecurity behavior in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the protection motivation theory, this study addresses the gap by investigatin... ver más
Revista: Information    Formato: Electrónico

 
en línea
Paulo Vitor de Campos Souza, Augusto Junio Guimarães, Thiago Silva Rezende, Vinicius Jonathan Silva Araujo and Vanessa Souza Araujo    
The fuzzy neural networks are hybrid structures that can act in several contexts of the pattern classification, including the detection of failures and anomalous behaviors. This paper discusses the use of an artificial intelligence model based on the ass... ver más
Revista: AI    Formato: Electrónico

 
en línea
Ammar Odeh and Anas Abu Taleb    
Cybersecurity finds widespread applications across diverse domains, encompassing intelligent industrial systems, residential environments, personal gadgets, and automobiles. This has spurred groundbreaking advancements while concurrently posing persisten... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, Selahattin Kosunalp, Teodor Iliev and Ivaylo Stoyanov    
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The num... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Manohar Chamana, Rabindra Bhatta, Konrad Schmitt, Rajendra Shrestha and Stephen Bayne    
The increased adoption of information and communication technology for smart grid applications will require innovative cyber?physical system (CPS) testbeds to support research and education in the field. Groundbreaking CPS testbeds with realistic and sca... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kunj Joshi, Chintan Bhatt, Kaushal Shah, Dwireph Parmar, Juan M. Corchado, Alessandro Bruno and Pier Luigi Mazzeo    
Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the cha... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Shereen Ismail, Diana W. Dawoud and Hassan Reza    
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs) are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have several limitations which complicate the design of effective attack prevent... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mario Aragonés Lozano, Israel Pérez Llopis and Manuel Esteve Domingo    
The number and the diversity in nature of daily cyber-attacks have increased in the last few years, and trends show that both will grow exponentially in the near future. Critical Infrastructures (CI) operators are not excluded from these issues; therefor... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, Inayatul Haq, Inam Ullah, Muhammad Iqbal and Habib Hamam    
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the most challenging things to stop. The biggest problem is caused by milli... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Kothai G,Poovammal E     Pág. pp. 33 - 44
Vehicular Adhoc Network (VANET) is an emerging technology that provides a digital communication among vehicles, persons and Road-Side Units (RSU). VANETs are highly vulnerable to cyber-attacks. These cyber-attacks make a wrong illusion on traffic jam, ca... ver más

 
en línea
Mohammed Khader, Marcel Karam and Hanna Fares    
Cybersecurity is a multifaceted global phenomenon representing complex socio-technical challenges for governments and private sectors. With technology constantly evolving, the types and numbers of cyberattacks affect different users in different ways. Th... ver más
Revista: Information    Formato: Electrónico

 
en línea
Carlos Enrique Montenegro,Paulo Alonso Gaona Garcia,Julio Barón Velandia. Universidad Distrital Francisco José de Caldas, Colombia     Pág. 101 - 114
Las honeynets son herramientas de seguridad informáticas muy usadas en la actualidad con el propósito de reunir información de posibles atacantes acerca de las vulnerabilidades presentes en nuestra red. Para realizar un correcto uso de ellas es necesario... ver más
Revista: Logos Ciencia & TecnologÍ­a    Formato: Electrónico

 
en línea
Sergii Lysenko, Kira Bobrovnikova, Vyacheslav Kharchenko and Oleg Savenko    
Cybersecurity is a common Internet of Things security challenge. The lack of security in IoT devices has led to a great number of devices being compromised, with threats from both inside and outside the IoT infrastructure. Attacks on the IoT infrastructu... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »