31   Artículos

 
en línea
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis    
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Valeria Mercuri, Martina Saletta and Claudio Ferretti    
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Shivashankar Hiremath, Eeshan Shetty, Allam Jaya Prakash, Suraj Prakash Sahoo, Kiran Kumar Patro, Kandala N. V. P. S. Rajesh and Pawel Plawiak    
The internet has become an indispensable tool for organizations, permeating every facet of their operations. Virtually all companies leverage Internet services for diverse purposes, including the digital storage of data in databases and cloud platforms. ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Thomas Schiller, Bruce Caulkins, Annie S. Wu and Sean Mondesire    
Internet of Things (IoT) devices are common in today?s computer networks. These devices can be computationally powerful, yet prone to cybersecurity exploitation. To remedy these growing security weaknesses, this work proposes a new artificial intelligenc... ver más
Revista: Information    Formato: Electrónico

 
en línea
Manish Bhurtel and Danda B. Rawat    
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya and Mohammed Ali    
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With recent advancements in automobiles, medical dev... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fazal Raheman, Tejas Bhagat, Brecht Vermeulen and Peter Van Daele    
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a ?necessary evil?. Third-party permissions resulting in an attack surface (AS) and in-computer st... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fazal Raheman    
The first week of August 2022 saw the world?s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a rigoro... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Israel Barbosa de Brito and Rafael T. de Sousa, Jr.    
The possibility of cyber-attacks against critical infrastructure, and in particular nuclear power plants, has prompted several efforts by academia. Many of these works aim to capture the vulnerabilities of the industrial control systems used in these pla... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sereysethy Touch and Jean-Noël Colin    
To proactively defend computer systems against cyber-attacks, a honeypot system?purposely designed to be prone to attacks?is commonly used to detect attacks, discover new vulnerabilities, exploits or malware before they actually do real damage to real sy... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »