58   Artículos

 
en línea
Maksym W. Sitnicki, Nataliia Prykaziuk, Humeniuk Ludmila, Olena Pimenowa, Florin Imbrea, Laura ?muleac and Raul Pa?calau    
The digitalization of the agricultural industry is manifested through the active use of innovative technologies in all its areas. Agribusiness owners have to constantly improve their security to meet new challenges. In this context, the existing cyber ri... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad    
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry    
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuwen Fu, E. Xia, Duan Huang and Yumei Jing    
Machine learning has been applied in continuous-variable quantum key distribution (CVQKD) systems to address the growing threat of quantum hacking attacks. However, the use of machine learning algorithms for detecting these attacks has uncovered a vulner... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Shouq Alrobaian, Saif Alshahrani and Abdulaziz Almaleh    
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Fazal Raheman    
The first week of August 2022 saw the world?s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a rigoro... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fazal Raheman, Tejas Bhagat, Brecht Vermeulen and Peter Van Daele    
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a ?necessary evil?. Third-party permissions resulting in an attack surface (AS) and in-computer st... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ahlam Fakieh and Aymen Akremi    
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper stud... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jae-Myeong Kim, Min-Gu Kim and Sung-Bum Pan    
With the spread of the modern media industry, harmful genre contents are indiscriminately disseminated to teenagers. The password identification method used to block sensational and violent genre content has become a problem that teenagers can easily ste... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sergii Lysenko, Kira Bobrovnikova, Vyacheslav Kharchenko and Oleg Savenko    
Cybersecurity is a common Internet of Things security challenge. The lack of security in IoT devices has led to a great number of devices being compromised, with threats from both inside and outside the IoT infrastructure. Attacks on the IoT infrastructu... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »