38   Artículos

 
en línea
Catarina Palma, Artur Ferreira and Mário Figueiredo    
The presence of malicious software (malware), for example, in Android applications (apps), has harmful or irreparable consequences to the user and/or the device. Despite the protections app stores provide to avoid malware, it keeps growing in sophisticat... ver más
Revista: Information    Formato: Electrónico

 
en línea
Abner Perez-Haro and Arturo Diaz-Perez    
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Pankaj Khatiwada, Bian Yang, Jia-Chun Lin, Godfrey Mugurusi and Stian Underbekken    
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask fo... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Mohammed N. AlJarrah, Qussai M. Yaseen and Ahmad M. Mustafa    
The Android platform has become the most popular smartphone operating system, which makes it a target for malicious mobile apps. This paper proposes a machine learning-based approach for Android malware detection based on application features. Unlike man... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shaked Delarea and Yossi Oren    
Fault attacks are traditionally considered under a threat model that assumes the device under test is in the possession of the attacker. We propose a variation on this model. In our model, the attacker integrates a fault injection circuit into a maliciou... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fazal Raheman, Tejas Bhagat, Brecht Vermeulen and Peter Van Daele    
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a ?necessary evil?. Third-party permissions resulting in an attack surface (AS) and in-computer st... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fazal Raheman    
The first week of August 2022 saw the world?s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a rigoro... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Annie Hamilton Gingell and Sina Shahab    
This paper seeks to evaluate how successful national policy interventions have been at addressing land barriers to self-build and custom housebuilding when applied by Local Planning Authorities (LPAs) across the South West of England. A longitudinal tria... ver más
Revista: Urban Science    Formato: Electrónico

 
en línea
Efstratios Chatzoglou, Georgios Kambourakis and Vasileios Kouliaridis    
Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of software... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Anna V. Mikhailenko, Vladimir A. Ermolaev and Dmitry A. Ruban    
Distant observation of unique geological and geomorphological features facilitates comprehension and tourism of these important resources. Bridges offer an opportunity for such observation, and the idea of bridge-based geoheritage viewpoints is proposed.... ver más
Revista: Geosciences    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »