20   Artículos

 
en línea
Ruikui Ma, Qiuqian Wang, Xiangxi Bu and Xuebin Chen    
With the development of the Internet of Things, a huge number of devices are connected to the network, network traffic is exhibiting massive and low latency characteristics. At the same time, it is becoming cheaper and cheaper to launch DDoS attacks, and... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos    
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Samuel A. Ross, Amanda E. White, Adam Andresen, Shah Saud Alam and Christopher Depcik    
The Martian topography needs to be investigated in greater detail for human habitations, and this can be accomplished faster using unmanned aerial vehicles (UAVs). In this regard, the RQ-11B Raven appears suitable for remote sensing and topography-mappin... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Ruobin Qi, Craig Rasband, Jun Zheng and Raul Longoria    
Smart grids integrate advanced information and communication technologies (ICTs) into traditional power grids for more efficient and resilient power delivery and management, but also introduce new security vulnerabilities that can be exploited by adversa... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hosam Alrahhal, Mohamad Shady Alrahhal, Razan Jamous and Kamal Jambi    
Location-based services (LBS) form the main part of the Internet of Things (IoT) and have received a significant amount of attention from the research community as well as application users due to the popularity of wireless devices and the daily growth i... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Luís M. B. C. Campos and Paulo J. S. Gil    
The two dimensional gravity turn problem is addressed allowing for the effects of variable rocket mass due to propellant consumption, thrust and thrust vector angle, lift and drag forces at an angle-of-attack and atmospheric mass density varying with alt... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Dania Aljeaid, Amal Alzhrani, Mona Alrougi and Oroob Almalki    
Phishing attacks are cybersecurity threats that have become increasingly sophisticated. Phishing is a cyberattack that can be carried out using various approaches and techniques. Usually, an attacker uses trickery as well as fraudulent and disguised mean... ver más
Revista: Information    Formato: Electrónico

 
en línea
Kotey Seth Djanie, Tchao Eric Tutu and Gadze James Dzisi    
A denial of service (DoS) attack in a computer network is an attack on the availability of computer resources to prevent users from having access to those resources over the network. Denial of service attacks can be costly, capable of reaching $100,000 p... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Sahar Alshathry     Pág. 3037 - 3039
Saudi Aramco is the largest oil production company in the entire world. It supplies almost almost 1/10th of the oil in the world. The economy of Saudi Arabia is highly dependent on the production of oil. Aramco got attacked by a virus named Shamoon on 15... ver más

 
en línea
Ashraf Hamdan Aljammal,Hani Bani-Salameh,Ayoub Alsarhan,Mohammad Kharabsheh,Mamoon Obiedat     Pág. pp. 55 - 65
Currently, cloud computing is facing different types of threats whether from inside or outside its environment.  This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new techniqu... ver más

« Anterior     Página: 1 de 1     Siguiente »