Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Christian D. Jensen"'
Publikováno v:
Sensors, Vol 24, Iss 20, p 6547 (2024)
Noise (un-important) alerts are generally considered a major challenge in intrusion detection systems/sensors because they require more analysts to review and may cause disruption to systems that are shut down to avoid the consequences of a compromis
Externí odkaz:
https://doaj.org/article/e36192cfc40a4c15bdaa385c53565d5a
Publikováno v:
Future Internet, Vol 14, Iss 12, p 372 (2022)
The Internet has rapidly grown into a distributed and collaborative network with over one billion users, e.g., the Internet of Things (IoT). The future Internet will become the core of the next information infrastructure in regard to computation and
Externí odkaz:
https://doaj.org/article/c7c97d7f48674450bb85401a3032fdf2
Publikováno v:
Geoforum Perspektiv, Vol 19, Iss 35 (2021)
Der er stor udvikling i anvendelsen af Smart City teknologier i Danmark. Sensorer sættes op flere steder i byrummet for at indsamle data, der kan forbedre den kommunale service – endda på tværs af kommunegrænser. Men hvilke data må kommunerne
Externí odkaz:
https://doaj.org/article/6b3a1ef59dc64fb6811bcecf5aebd478
Autor:
Shizra Sultan, Christian D. Jensen
Publikováno v:
Sensors, Vol 21, Iss 9, p 3041 (2021)
The amount of data generated in today’s world has a fair share of personal information about individuals that helps data owners and data processors in providing them with personalized services. Different legal and regulatory obligations apply to al
Externí odkaz:
https://doaj.org/article/749472b6476940a29f09a8bcce29518f
Autor:
Rishikesh Sahay, D.A. Sepulveda Estay, Weizhi Meng, Christian D. Jensen, Michael Bruhn Barfod
Publikováno v:
Sahay, R, Estay, D A S, Meng, W, Jensen, C D & Barfod, M B 2023, ' A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS ', Computers and Security, vol. 128, 103179 . https://doi.org/10.1016/j.cose.2023.103179
The widespread use of software-intensive cyber systems in critical infrastructures such as ships (CyberShips) has brought huge benefits, yet it has also opened new avenues for cyber attacks to potentially disrupt operations. Cyber risk assessment pla
Publikováno v:
Hageman, K, Homayoun, S, Afzal-Houshmand, S, Jensen, C D & Pedersen, J M 2022, Detecting Ambiguous Phishing Certificates using Machine Learning . in Proceedings of 36 th International Conference on Information Networking . IEEE, 36 th International Conference on Information Networking, Jeju Island, Korea, Republic of, 12/01/2022 .
Homayoun, S, Hageman, K D, Afzal-Houshmand, S, Jensen, C D & Pedersen, J M 2022, Detecting Ambiguous Phishing Certificates using Machine Learning . in 2022 International Conference on Information Networking (ICOIN) . IEEE, pp. 1-6, 2022 International Conference on Information Networking (ICOIN), Jeju-si, Korea, Republic of, 12/01/2022 . https://doi.org/10.1109/ICOIN53446.2022.9687264
Homayoun, S, Hageman, K D, Afzal-Houshmand, S, Jensen, C D & Pedersen, J M 2022, Detecting Ambiguous Phishing Certificates using Machine Learning . in 2022 International Conference on Information Networking (ICOIN) . IEEE, pp. 1-6, 2022 International Conference on Information Networking (ICOIN), Jeju-si, Korea, Republic of, 12/01/2022 . https://doi.org/10.1109/ICOIN53446.2022.9687264
Recent phishing attacks have started to migrate to HTTP over TLS (HTTPS), making a phishing web page appear safe to the user's browser despite its malicious purpose. This paper benefits from both digital certificates and domains related data features
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::24b148642300024abbc032106beed6b1
https://orbit.dtu.dk/en/publications/48b8a9a9-4b6b-4898-8af5-1db91c449090
https://orbit.dtu.dk/en/publications/48b8a9a9-4b6b-4898-8af5-1db91c449090
Autor:
Marios Anagnostopoulos, Egon Kidmose, Amine Laghaout, Rasmus L. Olsen, Sajad Homayoun, Christian D. Jensen, Jens M. Pedersen
Publikováno v:
Network and System Security ISBN: 9783030927073
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ca9f514587a1629aafdc85012b2a938b
https://doi.org/10.1007/978-3-030-92708-0_11
https://doi.org/10.1007/978-3-030-92708-0_11
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark•, in August 2020. The 33 revised full papers were carefully selected from 139 s