69   Artículos

 
en línea
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran    
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Faeiz Alserhani and Alaa Aljared    
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mauricio Diéguez, Carlos Cares, Cristina Cachero and Jorge Hochstetter    
As cyber-attacks grow worldwide, companies have begun to realize the importance of being protected against malicious actions that seek to violate their systems and access their information assets. Faced with this scenario, organizations must carry out co... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information    Formato: Electrónico

 
en línea
Marco Vernier, Manuela Farinosi, Alberto Foresti and Gian Luca Foresti    
In recent years, social platforms have become integrated in a variety of economic, political and cultural domains. Social media have become the primary outlets for many citizens to consume news and information, and, at the same time, to produce and share... ver más
Revista: Information    Formato: Electrónico

 
en línea
Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe and Ning Weng    
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associate... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Fahim Sufi    
Utilizing social media data is imperative in comprehending critical insights on the Russia?Ukraine cyber conflict due to their unparalleled capacity to provide real-time information dissemination, thereby enabling the timely tracking and analysis of cybe... ver más
Revista: Information    Formato: Electrónico

 
en línea
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke    
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota    
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu    
Software developers represent the bastion of application security against the overwhelming cyber-attacks which target all organizations and affect their resilience. As security weaknesses which may be introduced during the process of code writing are com... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »