Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Ivan Taurino"'
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 18:333-346
The introduction of new memory-based crypto-mining techniques and the rise of new web technologies like WebAssembly, made the use of browsers for crypto-currencies mining more and more convenient and popular. That, in turn, originated a new form of c
Publikováno v:
2022 7th International Conference on Smart and Sustainable Technologies (SpliTech).
Publikováno v:
IEEE Access, Vol 7, Pp 41576-41583 (2019)
The rapid spread of micropayment systems, together with some peculiarity of their typical use, have attracted computer criminals and dishonest companies aiming at exploiting the systems’ weaknesses to steal from users both personal data and money.
Man-in-the-Middle (MitM), one of the best known attacks in the world of computer security, is among the greatest concerns for professionals in the field. Main goal of MitM is to compromise confidentiality, integrity and availability of data flowing b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::421ff1c384e17cbdacd94e979e0692db
https://hdl.handle.net/11587/473424
https://hdl.handle.net/11587/473424
Publikováno v:
INTED2016 Proceedings.
In this paper we describe the testing activities carried out to evaluate the benefits that the digital educational format implementation ILIADE (“Insegnare L’Informatica A Distanza Efficacemente”, Distance Teaching Computer Science Effectively)