Zobrazeno 1 - 10
of 26 639
pro vyhledávání: '"Attack surface"'
Publikováno v:
Computer Security Update, 2024 Aug 01. 25(8), 1-2.
Externí odkaz:
https://www.jstor.org/stable/48781989
Publikováno v:
Computer Security Update, 2024 Jul 01. 25(7), 7-8.
Externí odkaz:
https://www.jstor.org/stable/48776190
Autor:
Cory Doctorow
Return to the world of Little Brother and Homeland. Attack Surface takes us five minutes into the future, to a world where everything is connected and everyone is vulnerable. Masha Maximow has made some bad choices in life – choices that hurt peopl
Autor:
Liebl, Simon, Lathrop, Leah, Raithel, Ulrich, Aßmuth, Andreas, Ferguson, Ian, Söllner, Matthias
Publikováno v:
International Journal On Advances in Security, vol. 14, no. 1 and 2, pp. 59-70, 2021
The growing connectivity of industrial devices as a result of the Internet of Things is increasing the risks to Industrial Control Systems. Since attacks on such devices can also cause damage to people and machines, they must be properly secured. The
Externí odkaz:
http://arxiv.org/abs/2405.16318
Autor:
Pavel A. Teplyuk, Aleksei G. Yakunin
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 1, Pp 135-145 (2024)
The purpose of the study was to analyze possible methods for determining the attack surface in relation to solving the problem of fuzzing testing the kernel of operating systems of the Linux family and selecting the most suitable one. To evaluate and
Externí odkaz:
https://doaj.org/article/83bed058ad594cfca1bde9c132d60fcd
Autor:
Kaswan, Priyanka, Ulukus, Sennur
As the landscape of time-sensitive applications gains prominence in 5G/6G communications, timeliness of information updates at network nodes has become crucial, which is popularly quantified in the literature by the age of information metric. However
Externí odkaz:
http://arxiv.org/abs/2312.17220
With the rapid development of the Internet, cyber security issues have become increasingly prominent. Traditional cyber security defense methods are limited in the face of ever-changing threats, so it is critical to seek innovative attack surface gen
Externí odkaz:
http://arxiv.org/abs/2311.00240
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 12, Pp 128570-128584 (2024)
Refactoring is one of the techniques mostly employed by software developers to improve the quality attributes of their systems. However, little has been done to investigate how refactoring operations specifically aimed at improving the internal struc
Externí odkaz:
https://doaj.org/article/bc63751c1b08438eb529ebdc03e3f57d