Zobrazeno 1 - 10
of 568
pro vyhledávání: '"Mauro Conti"'
Publikováno v:
IEEE Access, Vol 12, Pp 48301-48320 (2024)
Vehicular networks are expanding their applications for future sustainability. The reported increasing rate of data breaches through vehicular networks by Distributed Denial of Service (DDoS) type of intrusion creates concern for such networks. Exist
Externí odkaz:
https://doaj.org/article/04bef58d19e54b349dad9cf2e4641aa8
Publikováno v:
IEEE Access, Vol 12, Pp 28225-28234 (2024)
While user authentication happens before initiating or resuming a login session, de-authentication detects the absence of a previously-authenticated user to revoke her currently active login session. The absence of proper de-authentication can lead t
Externí odkaz:
https://doaj.org/article/675eea7096c14ee9a81ab6268a2e181f
Publikováno v:
IET Cyber-Physical Systems, Vol 8, Iss 3, Pp 160-185 (2023)
Abstract Cyber‐Physical Systems (CPSs) are becoming more automated and aimed to be as efficient as possible by enabling integration between their operations and Information Technology (IT) resources. In combination with production automation, these
Externí odkaz:
https://doaj.org/article/2daead3f69fc4b5dade0696749fd02fc
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 3, Pp 364-395 (2023)
The ubiquity of Android smartphones makes them targets of sophisticated malware, which maintain long-term stealth, particularly by offloading attack steps to benign apps. Such malware leaves little to no trace in logs, and the attack steps become dif
Externí odkaz:
https://doaj.org/article/515d971d53b14b32a0f32c17e464f2dd
Publikováno v:
IEEE Access, Vol 11, Pp 44772-44786 (2023)
In recent years, the use of Software Defined Networking (SDN) has increased due to various network management requirements. Using SDN in computer network applications has brought several benefits to users, including lower operational costs, better ha
Externí odkaz:
https://doaj.org/article/a712d5d4a7224ec6816079217890373d
Publikováno v:
IEEE Access, Vol 11, Pp 9859-9875 (2023)
Augmented and Virtual Reality (AR and VR), collectively known as Extended Reality (XR), are increasingly gaining traction thanks to their technical advancement and the need for remote connections, recently accentuated by the pandemic. Remote surgery,
Externí odkaz:
https://doaj.org/article/36846a5a42324820bb80cc64754a1cd2
Publikováno v:
IEEE Access, Vol 10, Pp 121173-121192 (2022)
The increasing number of connected devices in the era of Internet of Thing (IoT) has also increased the number intrusions. Intrusion Detection System (IDS) is a secondary intelligent system to monitor, detect, and alert about malicious activities; an
Externí odkaz:
https://doaj.org/article/d94ce7907ea7429c938fdf45afbb4b3e
Autor:
Fran Casino, Thomas K. Dasaklis, Georgios P. Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, Istvan Borocz, Agusti Solanas, Mauro Conti, Constantinos Patsakis
Publikováno v:
IEEE Access, Vol 10, Pp 25464-25493 (2022)
Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is directly related to the complexity of evidence acqu
Externí odkaz:
https://doaj.org/article/1eac5ce2d30e4b198ebf8bb278527d72
Autor:
Marco Fama, Mauro Conti
Publikováno v:
Cambio, Vol 12, Iss 23 (2022)
The paper explores the impact of finance's penetration into agriculture and the global food system. The authors analyse the causes of the recent global food crises, unveiling the key role played by financial speculation and explaining why this phenom
Externí odkaz:
https://doaj.org/article/bbf9dba9b94a409abea079de94214312
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 3 (2022)
Xiaomi is the leading company in the fitness tracking industry. Successful attacks on its fitness tracking ecosystem would result in severe consequences, including the loss of sensitive health and personal data. Despite these relevant risks, we know
Externí odkaz:
https://doaj.org/article/c8d3963d02d24842b6a3792af2d1deeb