51   Artículos

 
en línea
Davy Preuveneers and Wouter Joosen    
Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously m... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mazen Gazzan and Frederick T. Sheldon    
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ahmad Naseem Alvi, Mumtaz Ali, Mohamed Saad Saleh, Mohammed Alkhathami, Deafallah Alsadie, Bushra Alghamdi and Badriya Alenzi    
The popularity of fog-enabled smart cities is increasing due to the advantages provided by modern communication and information technologies, which contribute to an improved quality of life. Wireless networks make them more vulnerable when the network is... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Qasem Abu Al-Haija and Ahmed Al-Tamimi    
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol?s advantages, it is vulnerable to flooding, denia... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Woonghee Lee, Mingeon Ju, Yura Sim, Young Kul Jung, Tae Hyung Kim and Younghoon Kim    
Deep learning-based segmentation models have made a profound impact on medical procedures, with U-Net based computed tomography (CT) segmentation models exhibiting remarkable performance. Yet, even with these advances, these models are found to be vulner... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan    
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Maki Kihara and Satoshi Iriyama    
A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain cryp... ver más
Revista: Information    Formato: Electrónico

 
en línea
Subhan Ullah, Zahid Mahmood, Nabeel Ali, Tahir Ahmad and Attaullah Buriro    
The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In this p... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma    
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ying Zhang, Qi Zhang, Yu Zhang and Zhiyuan Zhu    
Ocean wireless sensor networks (OWSNs) play an important role in marine environment monitoring, underwater target tracking, and marine defense. OWSNs not only monitor the surface information in real time but also act as an important relay layer for under... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »