61   Artículos

 
en línea
Qing Li, Yu Li, Lingyun Zhao, Zhixiong Zhang, Yu Wang and Meihong Ma    
Accurately assessing the risk of flash floods is a fundamental prerequisite for defending against flash flood disasters. The existing methods for assessing flash flood risk are constrained by unclear key factors and challenges in elucidating disaster mec... ver más
Revista: Water    Formato: Electrónico

 
en línea
Naning Fatmawatie     Pág. 101 - 112
AbstractionThe success of economic development has indicators of economic factors and non-economic factors. The impact of the corona has made the Indonesian economy slump. The business world in various sectors, including trade, industry, and services, ha... ver más
Revista: Management and Economics Journal (MEC-J)    Formato: Electrónico

 
en línea
Fahad M. Alotaibi and Vassilios G. Vassilakis    
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang    
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Fu-Hau Hsu, Min-Hao Wu, Yan-Ling Hwang, Jian-Xin Chen, Jian-Hong Huang, Hao-Jyun Wang and Yi-Wen Lai    
The number of Internet of Things (IoT) devices has increased dramatically in recent years, and Bluetooth technology is critical for communication between IoT devices. It is possible to protect electronic communications, the Internet of Things (IoT), and ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Mario Alviano    
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Mahfod M. Aldoseri and Maged M. Albaz    
This research aims to broaden the understanding of the determinants of climate change disclosure, where the study analyzes the impact of corporate business strategy and Chief Executive Officer (CEO) overconfidence on the level of climate change disclosur... ver más
Revista: International Journal of Financial Studies    Formato: Electrónico

 
en línea
Sapdo Utomo, Adarsh Rouniyar, Hsiu-Chun Hsu and Pao-Ann Hsiung    
Smart city applications that request sensitive user information necessitate a comprehensive data privacy solution. Federated learning (FL), also known as privacy by design, is a new paradigm in machine learning (ML). However, FL models are susceptible to... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Cristian Chindrus and Constantin-Florin Caruntu    
In today?s dynamic and evolving digital landscape, safeguarding network infrastructure against cyber threats has become a paramount concern for organizations worldwide. This paper presents a novel and practical approach to enhancing cybersecurity readine... ver más
Revista: Information    Formato: Electrónico

 
en línea
Omar Azib Alkhudaydi, Moez Krichen and Ans D. Alghamdi    
With the increasing severity and frequency of cyberattacks, the rapid expansion of smart objects intensifies cybersecurity threats. The vast communication traffic data between Internet of Things (IoT) devices presents a considerable challenge in defendin... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »