103   Artículos

« Anterior     Página: 1 de 6     Siguiente »

 
en línea
Omar Flor-Unda, Freddy Simbaña, Xavier Larriva-Novo, Ángel Acuña, Rolando Tipán and Patricia Acosta-Vargas    
Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that affect public and private services a... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, Evgeny Abramov and Anatoly Basyuk    
The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main modules: a data acquisition module for data processing and a normalization module. One of the main features of an adaptive UAV protection system is the analysis of its cybe... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari    
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac... ver más
Revista: Information    Formato: Electrónico

 
en línea
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan    
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ziyad R. Alashhab, Mohammed Anbar, Manmeet Mahinderjit Singh, Iznan H. Hasbullah, Prateek Jain and Taief Alaa Al-Amiedy    
Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new services and computing resources at a fraction of the costs for end-users than traditional com... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sergii Lysenko, Kira Bobrovnikova, Vyacheslav Kharchenko and Oleg Savenko    
Cybersecurity is a common Internet of Things security challenge. The lack of security in IoT devices has led to a great number of devices being compromised, with threats from both inside and outside the IoT infrastructure. Attacks on the IoT infrastructu... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Konstantinos Tsiknas, Dimitrios Taketzis, Konstantinos Demertzis and Charalabos Skianis    
In today?s Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data str... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Morgan Luck    
Internal cyber-attacks (cyber-attacks which occur from within an organization) pose a serious threat to an organization?s security. One tool that organizations can employ to help them detect such threats is the internal cyber-sting. An internal cyber-sti... ver más
Revista: Australasian Journal of Information Systems    Formato: Electrónico

 
en línea
Manfred Sneps-Sneppe,Dmitry Namiot     Pág. 48 - 58
The article is devoted to the discussion of the telecommunications development strategy. Communication specialists all around the world are facing the same problem: shifting from circuit switching (CS) to packet switching (CS). We will provide examples t... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Boris Svilicic, Igor Rudan, Alen Jugovic and Damir Zec    
The integrated navigational system (INS) enhances the effectiveness and safety of ship navigation by providing multifunctional display on the basis of integration of at least two navigational functions, the voyage route monitoring with Electronic Chart D... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Feras Izzat Oqlah Kasasbeh,Nawaf Samah M. Thuneibat     Pág. 19 - 25
The study aimed at illustrating the history of cyber-attack experienced by Saudi Arabian organizations especially universities and overall cyber readiness. The study included 486 respondents from three different universities in Saudi Arabia. Survey was a... ver más
Revista: International Review of Management and Marketing    Formato: Electrónico

 
en línea
George Loukas, Diane Gan and Tuan Vuong    
Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, wh... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
George Loukas, Diane Gan and Tuan Vuong    
Revista: Future Internet    Formato: Electrónico

 
en línea
Faulinda Ely Nastiti,Dedy Hariyadi,Fazlurrahman Bima     Pág. 51 - 54
Ancaman serangan siber masih didominasi oleh malware. Beberapa penyedia telah menyediakan peta dan analisis serangan malware berbasis agen yang telah ditempatkan pada beberapa infrastruktur. Namun, ada pihak lain yang menyediakan data serangan Malware ya... ver más

 
en línea
Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis and Vasilios Katos    
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security anal... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Melissa Carlton, Yair Levy     Pág. 16 - 28
Cyber threats have been growing with social engineering and business e-mail compromise reported as the two most rising penetration vectors. Advanced Persistent Threats (APTs) are penetration techniques that combine several approaches to gain access to or... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

 
en línea
Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko and Sergei Verevkin    
Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective responses... ver más
Revista: Information    Formato: Electrónico

 
en línea
Bushra Mohamed Elamin Elnaim    
The following research paper is focusing on the research of online retailing adoption while challenges that are being faced in the area of system and network security. The research explores the major issues that put noticeable influence on the decision o... ver más

 
en línea
Avi Shaked and Oded Margalit    
The cyber threat landscape is highly dynamic, posing a significant risk to the operations of systems and organisations. An organisation should, therefore, continuously monitor for new threats and properly contextualise them to identify and manage the res... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Reshna Raveendran and Kheira Anissa Tabet Aoul    
Smart buildings deploying 5G and the Internet of Things (IoT) are viewed as the next sustainable solution that can be seamlessly integrated in all sectors of the built environment. The benefits are well advertised and range from inducing wellness and mon... ver más
Revista: Buildings    Formato: Electrónico

« Anterior     Página: 1 de 6     Siguiente »