|
|
|
Ruikui Ma, Qiuqian Wang, Xiangxi Bu and Xuebin Chen
With the development of the Internet of Things, a huge number of devices are connected to the network, network traffic is exhibiting massive and low latency characteristics. At the same time, it is becoming cheaper and cheaper to launch DDoS attacks, and...
ver más
|
|
|
|
|
|
|
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi...
ver más
|
|
|
|
|
|
|
Samuel A. Ross, Amanda E. White, Adam Andresen, Shah Saud Alam and Christopher Depcik
The Martian topography needs to be investigated in greater detail for human habitations, and this can be accomplished faster using unmanned aerial vehicles (UAVs). In this regard, the RQ-11B Raven appears suitable for remote sensing and topography-mappin...
ver más
|
|
|
|
|
|
|
Ruobin Qi, Craig Rasband, Jun Zheng and Raul Longoria
Smart grids integrate advanced information and communication technologies (ICTs) into traditional power grids for more efficient and resilient power delivery and management, but also introduce new security vulnerabilities that can be exploited by adversa...
ver más
|
|
|
|
|
|
|
Hosam Alrahhal, Mohamad Shady Alrahhal, Razan Jamous and Kamal Jambi
Location-based services (LBS) form the main part of the Internet of Things (IoT) and have received a significant amount of attention from the research community as well as application users due to the popularity of wireless devices and the daily growth i...
ver más
|
|
|
|
|
|
|
Luís M. B. C. Campos and Paulo J. S. Gil
The two dimensional gravity turn problem is addressed allowing for the effects of variable rocket mass due to propellant consumption, thrust and thrust vector angle, lift and drag forces at an angle-of-attack and atmospheric mass density varying with alt...
ver más
|
|
|
|
|
|
|
Dania Aljeaid, Amal Alzhrani, Mona Alrougi and Oroob Almalki
Phishing attacks are cybersecurity threats that have become increasingly sophisticated. Phishing is a cyberattack that can be carried out using various approaches and techniques. Usually, an attacker uses trickery as well as fraudulent and disguised mean...
ver más
|
|
|
|
|
|
|
Kotey Seth Djanie, Tchao Eric Tutu and Gadze James Dzisi
A denial of service (DoS) attack in a computer network is an attack on the availability of computer resources to prevent users from having access to those resources over the network. Denial of service attacks can be costly, capable of reaching $100,000 p...
ver más
|
|
|
|
|
|
|
Sahar Alshathry
Pág. 3037 - 3039
Saudi Aramco is the largest oil production company in the entire world. It supplies almost almost 1/10th of the oil in the world. The economy of Saudi Arabia is highly dependent on the production of oil. Aramco got attacked by a virus named Shamoon on 15...
ver más
|
|
|
|
|
|
|
Ashraf Hamdan Aljammal,Hani Bani-Salameh,Ayoub Alsarhan,Mohammad Kharabsheh,Mamoon Obiedat
Pág. pp. 55 - 65
Currently, cloud computing is facing different types of threats whether from inside or outside its environment. This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new techniqu...
ver más
|
|
|
|