Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Cagatay Yucel"'
Publikováno v:
Heliyon, Vol 9, Iss 6, Pp e16653- (2023)
The definition and nature of information have perplexed scientists due to its dual nature in measurements. The information is discrete and continuous when evaluated on a metric scale, and the Laplace-Beltrami operator and Gauss-Bonnet Theorem can map
Externí odkaz:
https://doaj.org/article/5cfdf71d8be14850b54ae902a1568afe
Publikováno v:
Future Internet, Vol 15, Iss 10, p 325 (2023)
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from diff
Externí odkaz:
https://doaj.org/article/971c3558e9994e35920accb13f1f1fae
Publikováno v:
Future Internet, Vol 14, Iss 11, p 315 (2022)
The introduction of Data Protection by Default and Design (DPbDD) brought in as part of the General Data Protection Regulation (GDPR) in 2018, has necessitated that businesses review how best to incorporate privacy into their processes in a transpare
Externí odkaz:
https://doaj.org/article/702e34a05dbf4de5a6b3b73b8e8a7cc4
Publikováno v:
Information & Security: An International Journal. 50:49-65
Malware is the instrument that delivers the decisive blow in cyber-attacks. A first-time presented malware or an updated malware can remain undetected and stealth until the attackers achieve their objectives. Information about malware and its use nee
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2659::1bd1fdd5cd81b927d75cd8b34a70af10
https://zenodo.org/record/5559385
https://zenodo.org/record/5559385
Autor:
Luis Angel Galindo Sanchez, Ioannis Chalkias, Cagatay Yucel, Dimitrios Mallis, Kadir Burak Mavzer, Henrique Alves, Deniz Cetinkaya, Ewa Konieczna
Publikováno v:
CSR
Information sharing has been considered a critical solution against the ever-increasing complexity of cyber-attacks. In this effort Cyber Threat Intelligence is undergoing a process of increasing its maturity levels. The quantification of the quality
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19ae6656cbb17b4cdcc15e53d112ac41
https://eprints.bournemouth.ac.uk/36104/7/ACTI_TQM.pdf
https://eprints.bournemouth.ac.uk/36104/7/ACTI_TQM.pdf
Autor:
Ioannis Chalkias, Alice Cooper, Cagatay Yucel, Deniz Cetinkaya, Dimitrios Mallis, Jane Henriksen-Bulmer
Publikováno v:
CSR
The recent technological advances and changes in the daily human activities increased the production and sharing of data. In the ecosystem of interconnected systems, data can be circulated among systems for various reasons. This could lead to exchang
Publikováno v:
Electronics, Vol 10, Iss 835, p 835 (2021)
Electronics
Volume 10
Issue 7
Electronics
Volume 10
Issue 7
Keystroke dynamics are used to authenticate users, to reveal some of their inherent or acquired characteristics and to assess their mental and physical states. The most common features utilized are the time intervals that the keys remain pressed and
Publikováno v:
EDUCON
The automotive industry is a dynamic industry that\ud is constantly evolving and changing with the advancements of\ud technology. As cars become more technology dependent, the\ud threat landscape and likelihood of a cyber-attack becomes greater\ud an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::98f2b7be36a9723dd65ac35ec42949fd
https://eprints.bournemouth.ac.uk/35951/1/Education_in_Cyber_Physical_Systems_Security_The_Case_of_Connected_Autonomous_Vehicles.pdf
https://eprints.bournemouth.ac.uk/35951/1/Education_in_Cyber_Physical_Systems_Security_The_Case_of_Connected_Autonomous_Vehicles.pdf
Autor:
Deniz Cetinkaya, Ioannis Chalkias, Evangelos Karagiannis, Vasilios Katos, Dimitrios Mallis, Cagatay Yucel
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030589998
MCSS
Multimedia Communications, Services & Security (MCSS'20)
MCSS
Multimedia Communications, Services & Security (MCSS'20)
In this paper we propose an approach for hunting adversarial tactics\ud technics and procedures (TTPs) by leveraging information described in structured cyber threat intelligence (CTI) models. We focused on the properties of\ud timeliness and complet
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b2214d088bae8edd8a478a329e592334
https://doi.org/10.1007/978-3-030-59000-0_5
https://doi.org/10.1007/978-3-030-59000-0_5