Zobrazeno 1 - 10
of 144
pro vyhledávání: '"Attack vector"'
Publikováno v:
Nuclear Engineering and Technology, Vol 55, Iss 6, Pp 2034-2046 (2023)
Industrial control systems in nuclear facilities are facing increasing cyber threats due to the widespread use of information and communication equipment. To implement cyber security programs effectively through the RG 5.71, it is necessary to quanti
Externí odkaz:
https://doaj.org/article/49f57b883bcf48a6b2e5a456dd84c652
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 9284-9300 (2022)
Cross-site scripting (XSS) attacks have been extensively studied in the literature, although mitigating such attacks remain a challenge for cyber defenders. In this paper, we survey the existing literature on XSS attacks, focusing on the range of att
Externí odkaz:
https://doaj.org/article/4f6c0cf29b464e3fba8d48b40f5ee70e
Publikováno v:
Mathematics, Vol 11, Iss 18, p 3939 (2023)
This paper considers the main approaches to building algorithms for the decision support systems of information protection strategies against cyberattacks in the networks of automated process control systems (the so-called recommender systems). The a
Externí odkaz:
https://doaj.org/article/194531f545f449f1b8d0cae246bbb201
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Media and Communication, Vol 9, Iss 1, Pp 88-98 (2021)
In the digital age, the crisis of journalism has been exacerbated by antagonistic actors infiltrating the journalistic system without adhering to its norms or logic. Journalism itself has been ill-prepared to respond to this challenge, but journalism
Externí odkaz:
https://doaj.org/article/635b24cf3f1a4bc882bc686b19e6199e
Autor:
Shakila Zaman, Khaled Alhazmi, Mohammed A. Aseeri, Muhammad Raisuddin Ahmed, Risala Tasin Khan, M. Shamim Kaiser, Mufti Mahmud
Publikováno v:
IEEE Access, Vol 9, Pp 94668-94690 (2021)
The Internet of Things (IoT) has emerged as a technology capable of connecting heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily lives simpler, safer, and fruitful. Being part of a large network of heterogeneou
Externí odkaz:
https://doaj.org/article/e5fd0954a58140669df3bc43a67dd9ad
Publikováno v:
IEEE Access, Vol 9, Pp 111463-111471 (2021)
The presence of organisations in Online Social Networks (OSNs) has motivated malicious users to look for attack vectors, which are then used to increase the possibility of carrying out successful attacks and obtaining either private information or ac
Externí odkaz:
https://doaj.org/article/8e61df8d30cd47b8b4c404ea88b5824f
Autor:
Yuancheng Li, Yuanyuan Wang
Publikováno v:
IEEE Access, Vol 7, Pp 3656-3664 (2019)
False data injection (FDI) attack causes a disadvantage to the safety of a power system. In the past, the adversary launching FDI attack mostly needed the complete network topology information of the power system and a large amount of measurements. H
Externí odkaz:
https://doaj.org/article/4a571f67f1a54af4b5e564aa7399f821
Publikováno v:
Frontiers in Energy Research, Vol 8 (2021)
Cyber-Physical Systems (CPS) is the amalgamation of highly sophisticated sensors with physical spaces. These close conjunctions of sensors with communication infrastructure intrinsically linking to society’s Critical Infrastructures (C.I.) are bein
Externí odkaz:
https://doaj.org/article/3dc718a4f3b54870bb3b6b45266a1f5f
Publikováno v:
Sensors, Vol 22, Iss 5, p 1959 (2022)
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network protocol and smart devices that have web interfaces such as route
Externí odkaz:
https://doaj.org/article/f18c3c31db0e41e6aa6f53872edd4174