Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Gonzalo de la Torre"'
Autor:
Islam, Nafis Tanveer, Khoury, Joseph, Seong, Andrew, Karkevandi, Mohammad Bahrami, Parra, Gonzalo De La Torre, Bou-Harb, Elias, Najafirad, Peyman
In software development, the predominant emphasis on functionality often supersedes security concerns, a trend gaining momentum with AI-driven automation tools like GitHub Copilot. These tools significantly improve developers' efficiency in functiona
Externí odkaz:
http://arxiv.org/abs/2401.03374
Publikováno v:
Entropy, Vol 23, Iss 5, p 618 (2021)
Nowadays, information and communications technology systems are fundamental assets of our social and economical model, and thus they should be properly protected against the malicious activity of cybercriminals. Defence mechanisms are generally artic
Externí odkaz:
https://doaj.org/article/7f474bae0e374549abdceacb3cd5f65a
Autor:
Islam, Nafis Tanveer, Parra, Gonzalo De La Torre, Manuel, Dylan, Bou-Harb, Elias, Najafirad, Peyman
Over the years, open-source software systems have become prey to threat actors. Even as open-source communities act quickly to patch the breach, code vulnerability screening should be an integral part of agile software development from the beginning.
Externí odkaz:
http://arxiv.org/abs/2304.11072
Publikováno v:
New Journal of Physics, Vol 18, Iss 3, p 035007 (2016)
Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little rando
Externí odkaz:
https://doaj.org/article/eb683df1e88b4acba881da1bfaee8f96
Publikováno v:
Physical Review X, Vol 4, Iss 1, p 011011 (2014)
The future progress of semi-device-independent quantum information science depends crucially on our ability to bound the strength of the nonlocal correlations achievable with finite-dimensional quantum resources. In this work, we characterize quantum
Externí odkaz:
https://doaj.org/article/1e25ec61fe4a4002af60a777af73c33b
Publikováno v:
Future Generation Computer Systems. 108:1092-1111
As self-driving vehicles become increasingly popular, new generations of attackers will seek to exploit vulnerabilities introduced by the technologies that underpin such vehicles for a range of motivations (e.g. curiosity, criminally-motivated, finan
Publikováno v:
Logic Journal of the IGPL. 28:546-557
In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying performance shortcomings and security breaches. The increasing complexity of both Internet services and traffic determines a scenario that in many cases
Publikováno v:
Journal of Network and Computer Applications. 135:32-46
Upgrading a power grid to a smart grid is a challenging task. For example, since power grids were originally developed to support unidirectional communications, the migration process requires architectural and cybersecurity upgrades due to the integr
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Network and Computer Applications. 163:102662
The reliability of Internet of Things (IoT) connected devices is heavily dependent on the security model employed to protect user data and prevent devices from engaging in malicious activity. Existing approaches for detecting phishing, distributed de