Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Carla Merkle Westphall"'
Publikováno v:
CLEI Electronic Journal, Vol 3, Iss 2 (2000)
This paper presents a CORBA Security discretionary prototype developed in the context of JaCoWeb Security Project. JaCoWeb Security Project is developing an authorization scheme for large-scale networks that is based on structures and concepts introd
Externí odkaz:
https://doaj.org/article/cabc9c72c5b841179bf061893de57b22
Publikováno v:
Revista ComInG - Communications and Innovations Gazette. 6:46-56
O número de ataques phishing atingiu em 2021 o maior número de todos os tempos até então, sendo o triplo desde 2020. Tal evento demonstra que, desde seu surgimento em 1995, como as técnicas de phishing são moldadas considerando o contexto de se
Publikováno v:
Computational Science and Its Applications – ICCSA 2022 ISBN: 9783031105210
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7fd2a714b47ec4554cd810feb82b5a82
https://doi.org/10.1007/978-3-031-10522-7_19
https://doi.org/10.1007/978-3-031-10522-7_19
Autor:
Carla Merkle Westphall, Eduardo da Silva, Carlos Becker Westphall, Marcos A. Michels Schlickmann, Rafael Bosse Brinhosa
Publikováno v:
Anais do XXI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2021).
Com o uso de aplicações web em ambientes dinâmicos de computação em nuvem integrados com dispositivos IoT, os ataques de injeção de SQL e de XSS (Cross-Site Scripting) continuam causando problemas para a segurança. A detecção de requisiçõ
Autor:
Cristiano Antonio de Souza, Carlos Becker Westphall, Renato Bobsin Machado, Leandro Loffi, Carla Merkle Westphall, Guilherme Arthur Geronimo
Publikováno v:
Computer Networks. 214:109154
Autor:
Romulo Almeida, Carla Merkle Westphall
Publikováno v:
ISI
With the improvement of techniques used by the attackers, the detection and prevention of threats such as phishing and malware can represent a problem and computational challenge. Recent research has found that phishing and malicious code infection a
Publikováno v:
2020 IEEE Sensors Applications Symposium (SAS).
Internet of things (IoT) and Fog computing applications deal with sensitive data and need security tools to be protected against attackers. CoAP (Constrained Application Protocol), combined with DTLS (Datagram Transport Layer Security), provides secu
Publikováno v:
Computer Networks. 122:29-42
With the rise of cloud computing, thousands of users and multiple applications have sought to communicate with each other, exchanging sensitive data. Thus, for effectively managing applications and resources, the use of models and tools is essential
Publikováno v:
SysCon
With the increasing advancement of services on the Internet, due to the strengthening of cloud computing, the exchange of data between providers and users is intense. Management of access control and applications need data to identify users and/or pe
Publikováno v:
COMSNETS
The authentication of restricted memory devices has major problems because memory consumption is high when applied with other protocols that have the purpose of mutual authentication. This article proposes an authentication model that validates mutua