|
|
|
Davy Preuveneers and Wouter Joosen
Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously m...
ver más
|
|
|
|
|
|
|
Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey and Kuo-Chu Chang
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective str...
ver más
|
|
|
|
|
|
|
Kexiang Qian, Hongyu Yang, Ruyu Li, Weizhe Chen, Xi Luo and Lihua Yin
With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to th...
ver más
|
|
|
|
|
|
|
Célia Tavares, Luciana Oliveira, Pedro Duarte and Manuel Moreira da Silva
According to a recent study by OpenAI, Open Research, and the University of Pennsylvania, large language models (LLMs) based on artificial intelligence (AI), such as generative pretrained transformers (GPTs), may have potential implications for the job m...
ver más
|
|
|
|
|
|
|
Adam Lockett, Ioannis Chalkias, Cagatay Yucel, Jane Henriksen-Bulmer and Vasilis Katos
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from differen...
ver más
|
|
|
|
|
|
|
Fahim Sufi
The surge in cybercrime has emerged as a pressing concern in contemporary society due to its far-reaching financial, social, and psychological repercussions on individuals. Beyond inflicting monetary losses, cyber-attacks exert adverse effects on the soc...
ver más
|
|
|
|
|
|
|
Abishek Manikandaraja, Peter Aaby and Nikolaos Pitropakis
Artificial intelligence and machine learning have become a necessary part of modern living along with the increased adoption of new computational devices. Because machine learning and artificial intelligence can detect malware better than traditional sig...
ver más
|
|
|
|
|
|
|
Dan Liu, Zhongkai Yao, Xiaoxia Yang, Chunmei Xiong and Qingyu Nie
The agricultural non-point source (NPS) pollution caused by non-irrigated farming, such as heavy metals, nitrogen and phosphorus, has posed an extreme threat to the security of agricultural product quality and watershed ecology. Thus, it is urgent to sor...
ver más
|
|
|
|
|
|
|
Mario Aragonés Lozano, Israel Pérez Llopis and Manuel Esteve Domingo
The number and the diversity in nature of daily cyber-attacks have increased in the last few years, and trends show that both will grow exponentially in the near future. Critical Infrastructures (CI) operators are not excluded from these issues; therefor...
ver más
|
|
|
|
|
|
|
Mazen Gazzan and Frederick T. Sheldon
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomware ...
ver más
|
|
|
|