Zobrazeno 1 - 10
of 2 260
pro vyhledávání: '"Cyber threats"'
Autor:
Evgenii S. Mityakov, Svetlana V. Artemova, Anatoly A. Bakaev, Alexander V. Dushkin, Zhanna G. Vegera
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 4, Pp 56-66 (2024)
The research problem lies in the absence of a comprehensive model for evaluating the effectiveness of information security systems, capable of taking into account both technical security aspects and subjective factors, such as user trust. Furthermore
Externí odkaz:
https://doaj.org/article/15c0d00bbae94afba05913a67d8c1bcd
Autor:
Anastasiia Khlaponina, Salam Omar Alo, Abeer Salim Jamil, Mohammed Jabbar Hussein, Mohammed K.H. Al-Dulaimi, Sarmad Waleed Taha
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 36, Iss 1, Pp 566-577 (2024)
Introduction: Traditional network intrusion detection systems (NIDS) face significant challenges in detecting ever-evolving cyber-threats. With the evolution of cyber-attacks, comes a mounting requirement for predictive methods which are competent in
Externí odkaz:
https://doaj.org/article/54846ed4c38e42348fb398a2119d510b
Autor:
M. Wasim Abbas Ashraf, Arvind R. Singh, A. Pandian, Rajkumar Singh Rathore, Mohit Bajaj, Ievgen Zaitsev
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-19 (2024)
Abstract While the proliferation of the Internet of Things (IoT) has revolutionized several industries, it has also created severe data security concerns. The security of these network devices and the dependability of IoT networks depend on efficient
Externí odkaz:
https://doaj.org/article/c92720e1254649dd924d4883488f1f4b
Publikováno v:
EURASIP Journal on Information Security, Vol 2024, Iss 1, Pp 1-9 (2024)
Abstract Safeguarding digital information against unauthorized access is critical in the industry context. Techniques for cracking passwords are essential tools for both attackers and defenders. This study explores the utilization of Bloom filters, a
Externí odkaz:
https://doaj.org/article/f20a858027dd4b32a0806e5700041ffa
Publikováno v:
Евразийская интеграция: экономика, право, политика, Vol 18, Iss 3, Pp 83-90 (2024)
The article presents an analysis of cybersecurity legislation in the member countries of the Eurasian Economic Union (EAEU), focusing on Russia, Kazakhstan, Kyrgyzstan and Belarus. In four parts of the article, the main aspects of the legal regulatio
Externí odkaz:
https://doaj.org/article/f3bc1bc37dbd4cc28c0eb42334e772e2
Autor:
Fahad Algarni
Publikováno v:
Alexandria Engineering Journal, Vol 106, Iss , Pp 793-808 (2024)
Sensors and wearable technology are used to accumulate health-related data from the visually impaired (VI) and other special persons. This health-related data is disseminated via an open network channel, which poses numerous threats and requires rigo
Externí odkaz:
https://doaj.org/article/378b9d17e48947338b08cee0ebc65c3a
Autor:
Luca SAMBUCCI, Elena-Anca PARASCHIV
Publikováno v:
Revista Română de Informatică și Automatică, Vol 34, Iss 3, Pp 131-148 (2024)
As artificial intelligence (AI) is becoming increasingly integrated into critical infrastructures, it brings about both transformative benefits and unprecedented risks. AI has the potential to revolutionize the efficiency, reliability, and responsive
Externí odkaz:
https://doaj.org/article/1b99216caf9b453bb93913aff59a5a8e
Autor:
S. G. Simonov, I. V. Lysenko
Publikováno v:
Омский научный вестник: Серия "Общество. История. Современность", Vol 9, Iss 3, Pp 149-157 (2024)
The article is devoted to the identification and analysis of new vectors of cybercrime development, their localization and prevention. The analysis of secondary data, questionnaires, and expert assessment are used as research methods for this probl
Externí odkaz:
https://doaj.org/article/e07ec2fb9f0341a78cb4ac752795a66e
Autor:
Olena Dobrovolska, Maryna Rozhkova
Publikováno v:
SocioEconomic Challenges, Vol 8, Iss 2, Pp 197-214 (2024)
This article is devoted to the assessment of the country’s sustainable cyberspace strategy by comparing the cyber security strategies of those countries that are economically developed and use advanced information and communication technologies. Ba
Externí odkaz:
https://doaj.org/article/11798fd633f540f78f0df97e15731459
Autor:
Valerii Lakhno, Bakhytzhan Akhmetov, Olena Kryvoruchko, Vitalyi Chubaievskyi, Alona Desiatko, Madina Bereke, Maria Shalabaeva
Publikováno v:
International Journal of Electronics and Telecommunications, Vol vol. 70, Iss No 2, Pp 413-420 (2024)
The potential breach of access to confidential content hosted in a university's Private Academic Cloud (PAC) underscores the need for developing new protection methods. This paper introduces a Threat Analyzer Software (TAS) and a predictive algorithm
Externí odkaz:
https://doaj.org/article/4bd9e609b59b46ffaab360e4164012d5