396   Artículos

 
en línea
Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey and Kuo-Chu Chang    
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective str... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Sharoug Alzaidy and Hamad Binsalleeh    
In the field of behavioral detection, deep learning has been extensively utilized. For example, deep learning models have been utilized to detect and classify malware. Deep learning, however, has vulnerabilities that can be exploited with crafted inputs,... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Maksym W. Sitnicki, Nataliia Prykaziuk, Humeniuk Ludmila, Olena Pimenowa, Florin Imbrea, Laura ?muleac and Raul Pa?calau    
The digitalization of the agricultural industry is manifested through the active use of innovative technologies in all its areas. Agribusiness owners have to constantly improve their security to meet new challenges. In this context, the existing cyber ri... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Marisol García-Valls and Alejandro M. Chirivella-Ciruelos    
The lack of sufficient guarantee about the authenticity of running smart contracts is a major entry barrier to blockchain networks. By authenticity,we refer to the smart contract ownership or provenance; this implies perfect matching between a published ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Bilgin Metin, Sefa Duran, Eda Telli, Meltem Mutlutürk and Martin Wynn    
In today?s technology-centric business environment, where organizations encounter numerous cyber threats, effective IT risk management is crucial. An objective risk assessment?based on information relating to business requirements, human elements, and th... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ted H. Szymanski    
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari    
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari    
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici    
The growth of the Internet of Things (IoT) has led to a significant rise in cyber attacks and an expanded attack surface for the average consumer. In order to protect consumers and infrastructure, research into detecting malicious IoT activity must be of... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Adam James Fenton    
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

« Anterior     Página: 1 de 24     Siguiente »