37   Artículos

 
en línea
Mazen Gazzan and Frederick T. Sheldon    
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu    
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of... ver más
Revista: Information    Formato: Electrónico

 
en línea
Adam James Fenton    
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Chao Liu, Buhong Wang, Zhen Wang, Jiwei Tian, Peng Luo and Yong Yang    
With the development of the air traffic management system (ATM), the cyber threat for ATM is becoming more and more serious. The recognition of ATM cyber threat entities is an important task, which can help ATM security experts quickly and accurately rec... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Vita Santa Barletta, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera and Manuel Ángel Serrano Martín    
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang and Jinyu Zhao    
In this paper, considering the problem that the common defensive means in the current cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into proactive to deal with the increasingly serious cyberspace securi... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Nureni Ayofe Azeez and Emad Fadhal    
Background: Internet social media platforms have become quite popular, enabling a wide range of online users to stay in touch with their friends and relatives wherever they are at any time. This has led to a significant increase in virtual crime from the... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Olha Shulha, Iryna Yanenkova, Mykhailo Kuzub, Iskandar Muda and Viktor Nazarenko    
The rapid development of the process of informatization of modern society has necessitated cybersecurity in all spheres of human activity, as the implementation of deliberate or unintentional influences on the information sphere by both external and inte... ver más

 
en línea
Avi Shaked and Oded Margalit    
The cyber threat landscape is highly dynamic, posing a significant risk to the operations of systems and organisations. An organisation should, therefore, continuously monitor for new threats and properly contextualise them to identify and manage the res... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Virgínia de Melo Dantas Trinks, Robson de Oliveira Albuquerque, Rafael Rabelo Nunes and Gibran Ayupe Mota    
The current international commercial structure places Brazilian Agribusiness in constant conflict to protect its interests before other nations in the global market. Technological innovations are used in all stages from the simplest production tasks, up ... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »