Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Hector Marco-Gisbert"'
Publikováno v:
IEEE Access, Vol 8, Pp 24416-24427 (2020)
Smart contracts are programs that reside within decentralized blockchains and are executed pursuant to triggered instructions. A smart contract acts in a similar way to a traditional agreement but negates the necessity for the involvement of a third
Externí odkaz:
https://doaj.org/article/f9b15b0bd8814d059e6efd23f817a1bb
Publikováno v:
IEEE Access, Vol 8, Pp 61872-61890 (2020)
Due to the impracticability of generating true randomness by running deterministic algorithms in computers, boot-loaders and operating systems undergo the lack of enough supplies of entropy at boot-time. This problem remains a challenge and affects a
Externí odkaz:
https://doaj.org/article/8d719e14fd7c4cc2bcf93f7ce0ce39f6
Publikováno v:
IEEE Access, Vol 8, Pp 161612-161629 (2020)
Given the significance that the cloud paradigm has in modern society, it is extremely important to provide security to users at all levels, especially at the most fundamental ones since these are the most sensitive and potentially harmful in the even
Externí odkaz:
https://doaj.org/article/72b2bfd54ed34afba3cd5eb2225eef44
Publikováno v:
Applied Sciences, Vol 12, Iss 8, p 3929 (2022)
The main contribution of this paper is to provide an accurate taxonomy for delivery techniques, which allows the detection of novel techniques and the identification of appropriate countermeasures. Delivery is a key stage for offensive cyber operatio
Externí odkaz:
https://doaj.org/article/fc1191122b7248e8897b347158f0d4aa
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 10, Iss 1, p 14 (2021)
Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation
Externí odkaz:
https://doaj.org/article/ecedf2ede7fa4dcd941b9106b08c4e3a
Autor:
Sarwar Sayeed, Hector Marco-Gisbert
Publikováno v:
Applied Sciences, Vol 10, Iss 18, p 6607 (2020)
The blockchain is a distributed ledger technology that is growing in importance since inception. Besides cryptocurrencies, it has also crossed its boundary inspiring various organizations, enterprises, or business establishments to adopt this technol
Externí odkaz:
https://doaj.org/article/ac3a8ca896e3490db0a63e61690828e8
Publikováno v:
Computers, Vol 9, Iss 2, p 48 (2020)
Memory errors are still a serious threat affecting millions of devices worldwide. Recently, bounty programs have reached a new record, paying up to USD 2.5 million for one single vulnerability in Android and up to USD 2 million for Apple’s operatin
Externí odkaz:
https://doaj.org/article/983d8fcee8b848b1afb6a25d7ab55743
Publikováno v:
Future Internet, Vol 12, Iss 1, p 12 (2020)
A webshell is a command execution environment in the form of web pages. It is often used by attackers as a backdoor tool for web server operations. Accurately detecting webshells is of great significance to web server protection. Most security produc
Externí odkaz:
https://doaj.org/article/9ba6b09236db4e5e89515b0d1f0861b7
Publikováno v:
Applied Sciences, Vol 9, Iss 20, p 4229 (2019)
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corruption vulnerabilities are still a major security threat. Consequently, control-flow integrity has received significant attention in the research comm
Externí odkaz:
https://doaj.org/article/3988d3dd333747ca8fdd75289a7954d5
Publikováno v:
Applied Sciences, Vol 9, Iss 15, p 2953 (2019)
Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The pro
Externí odkaz:
https://doaj.org/article/3185f2a000854deeace73968afa861c9