|
|
|
Omar Flor-Unda, Freddy Simbaña, Xavier Larriva-Novo, Ángel Acuña, Rolando Tipán and Patricia Acosta-Vargas
Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that affect public and private services a...
ver más
|
|
|
|
|
|
|
Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, Evgeny Abramov and Anatoly Basyuk
The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main modules: a data acquisition module for data processing and a normalization module. One of the main features of an adaptive UAV protection system is the analysis of its cybe...
ver más
|
|
|
|
|
|
|
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac...
ver más
|
|
|
|
|
|
|
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado...
ver más
|
|
|
|
|
|
|
Ziyad R. Alashhab, Mohammed Anbar, Manmeet Mahinderjit Singh, Iznan H. Hasbullah, Prateek Jain and Taief Alaa Al-Amiedy
Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new services and computing resources at a fraction of the costs for end-users than traditional com...
ver más
|
|
|
|
|
|
|
Sergii Lysenko, Kira Bobrovnikova, Vyacheslav Kharchenko and Oleg Savenko
Cybersecurity is a common Internet of Things security challenge. The lack of security in IoT devices has led to a great number of devices being compromised, with threats from both inside and outside the IoT infrastructure. Attacks on the IoT infrastructu...
ver más
|
|
|
|
|
|
|
Konstantinos Tsiknas, Dimitrios Taketzis, Konstantinos Demertzis and Charalabos Skianis
In today?s Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data str...
ver más
|
|
|
|
|
|
|
Morgan Luck
Internal cyber-attacks (cyber-attacks which occur from within an organization) pose a serious threat to an organization?s security. One tool that organizations can employ to help them detect such threats is the internal cyber-sting. An internal cyber-sti...
ver más
|
|
|
|
|
|
|
Manfred Sneps-Sneppe,Dmitry Namiot
Pág. 48 - 58
The article is devoted to the discussion of the telecommunications development strategy. Communication specialists all around the world are facing the same problem: shifting from circuit switching (CS) to packet switching (CS). We will provide examples t...
ver más
|
|
|
|
|
|
|
Boris Svilicic, Igor Rudan, Alen Jugovic and Damir Zec
The integrated navigational system (INS) enhances the effectiveness and safety of ship navigation by providing multifunctional display on the basis of integration of at least two navigational functions, the voyage route monitoring with Electronic Chart D...
ver más
|
|
|
|
|
|
|
Feras Izzat Oqlah Kasasbeh,Nawaf Samah M. Thuneibat
Pág. 19 - 25
The study aimed at illustrating the history of cyber-attack experienced by Saudi Arabian organizations especially universities and overall cyber readiness. The study included 486 respondents from three different universities in Saudi Arabia. Survey was a...
ver más
|
|
|
|
|
|
|
George Loukas, Diane Gan and Tuan Vuong
Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, wh...
ver más
|
|
|
|
|
|
|
George Loukas, Diane Gan and Tuan Vuong
|
|
|
|
|
|
|
Faulinda Ely Nastiti,Dedy Hariyadi,Fazlurrahman Bima
Pág. 51 - 54
Ancaman serangan siber masih didominasi oleh malware. Beberapa penyedia telah menyediakan peta dan analisis serangan malware berbasis agen yang telah ditempatkan pada beberapa infrastruktur. Namun, ada pihak lain yang menyediakan data serangan Malware ya...
ver más
|
|
|
|
|
|
|
Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis and Vasilios Katos
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security anal...
ver más
|
|
|
|
|
|
|
Melissa Carlton, Yair Levy
Pág. 16 - 28
Cyber threats have been growing with social engineering and business e-mail compromise reported as the two most rising penetration vectors. Advanced Persistent Threats (APTs) are penetration techniques that combine several approaches to gain access to or...
ver más
|
|
|
|
|
|
|
Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko and Sergei Verevkin
Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective responses...
ver más
|
|
|
|
|
|
|
Bushra Mohamed Elamin Elnaim
The following research paper is focusing on the research of online retailing adoption while challenges that are being faced in the area of system and network security. The research explores the major issues that put noticeable influence on the decision o...
ver más
|
|
|
|
|
|
|
Avi Shaked and Oded Margalit
The cyber threat landscape is highly dynamic, posing a significant risk to the operations of systems and organisations. An organisation should, therefore, continuously monitor for new threats and properly contextualise them to identify and manage the res...
ver más
|
|
|
|
|
|
|
Reshna Raveendran and Kheira Anissa Tabet Aoul
Smart buildings deploying 5G and the Internet of Things (IoT) are viewed as the next sustainable solution that can be seamlessly integrated in all sectors of the built environment. The benefits are well advertised and range from inducing wellness and mon...
ver más
|
|
|
|