Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Matej, Kacic"'
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783030692544
SECITC
SECITC
Nowadays, the number of discovered vulnerabilities increases rapidly. In 2018, the 17, 308 vulnerabilities were discovered and during the 2019 even more, so up to 20, 362. The serious problem is that a substantial part of them is rated as critical or
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7f61b99aa55fb3a292c9db049c45e614
https://doi.org/10.1007/978-3-030-69255-1_10
https://doi.org/10.1007/978-3-030-69255-1_10
Publikováno v:
Journal of Cyber Security and Mobility. 3:47-66
New technologies of multi-core and massively parallel processors are becoming common parts of today’s desktop computers. These state-of-the-art technologies allow programming of parallel applications and systems, however, creating parallel applicat
Publikováno v:
ICITST
Network traffic generation was the subject of many research projects in the past, but none of them could generate network data which has the same nature as a traffic from human or machine behavior. In this paper we introduce a related work in this fi
Publikováno v:
ICCST
Publikováno v:
2013 47th International Carnahan Conference on Security Technology (ICCST).
Nowadays wireless networks are becoming important in personal and public communication. Most of them are secured by 802.11i standard with strong AES cipher - WPA2. In many cases an attacker has the ability to listen to all encrypted network traffic,
Publikováno v:
IDAACS
The importance of safety standards of software systems is increasing as the use of software grows because of its convenience and flexibility. Software safety standards are very important in aircraft, military, automotive or medical devices. We are de
Publikováno v:
IDAACS
Nowadays we use the 802.11i standard, which is considered safe for now. In 2010, the Hole 196 vulnerability of Group Transient Key was discovered, which allows an undetectable insider ARP poisoning attack. On this ground we have founded the possibili
Publikováno v:
ICCST
Designing and implementing secure applications which use contactless communication link is difficult even when secure hardware is used. Many current proximity devices, such as contactless smart cards or near field communication devices, are verified
Publikováno v:
2013 47th International Carnahan Conference on Security Technology (ICCST); 2013, p1-4, 4p