Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Nick Savage"'
Publikováno v:
IEEE Access, Vol 8, Pp 128923-128929 (2020)
In recent years, the increasing prevalence of hate speech in social media has been considered as a serious problem worldwide. Many governments and organizations have made significant investment in hate speech detection techniques, which have also att
Externí odkaz:
https://doaj.org/article/a986df21fc6f41988905bd7251644564
Publikováno v:
Applied Sciences, Vol 10, Iss 15, p 5046 (2020)
Insider threats have become a considerable information security issue that governments and organizations must face. The implementation of security policies and procedures may not be enough to protect organizational assets. Even with the evolution of
Externí odkaz:
https://doaj.org/article/f4e507053c4541b7a0f0743d52c45742
Autor:
Fabian Friederich, Karl Henrik May, Bessem Baccouche, Carsten Matheis, Maris Bauer, Joachim Jonuscheit, Michael Moor, David Denman, Jamie Bramble, Nick Savage
Publikováno v:
Photonics, Vol 5, Iss 1, p 1 (2018)
Radomes protecting sensitive radar, navigational, and communications equipment of, e.g., aircraft, are strongly exposed to the environment and have to withstand harsh weather conditions and potential impacts. Besides their significance to the structu
Externí odkaz:
https://doaj.org/article/538b4913008a4b66a522ced77f910d6b
Publikováno v:
International Journal of Antennas and Propagation, Vol 2010 (2010)
Extensive studies of the impact of temporal variations induced by people on the characteristics of indoor wideband channels are reported. Singular Value Decomposition Prony algorithm has been used to compute the impulse response from measured channel
Externí odkaz:
https://doaj.org/article/255a34edbc064fcba2c4e3cf38b90559
Publikováno v:
Swann, M, Rose, J, Bendiab, G, Shiaeles, S & Savage, N 2021, ' A comparative study of traffic generators: applicability for malware detection testbeds ', Journal of Internet Technology and Secured Transactions, vol. 8, pp. 705-713 . https://doi.org/10.20533/jitst.2046.3723.2020.0085
Network traffic generators are invaluable tools that allow for applied experimentation to evaluate the performance of networks, infrastructure, and security controls, by modelling and simulating the communication packets and payloads that would be pr
Publikováno v:
Naik, N, Jenkins, P, Savage, N & Yang, L 2020, ' A computational intelligence enabled honeypot for chasing ghosts in the wires ', Complex & Intelligent Systems . https://doi.org/10.1007/s40747-020-00209-5
A honeypot is a concealed security system that functions as a decoy to entice cyberattackers to reveal their information. Therefore, it is essential to disguise its identity to ensure its successful operation. Nonetheless, cyberattackers frequently a
Publikováno v:
World Congress on Internet Security (WorldCIS-2020) in collaboration with the International Conference for Internet Technology and Secured Transactions (ICITST-2020), World Congress on Sustainable Technologies (WCST-2020) and World Congress on Industrial Control Systems Security (WCICSS-2020)
Network traffic generators are invaluable tools that allow for applied experimentation to evaluate the performance of networks, infrastructure, and security controls, by modelling and simulating the communication packets and payloads that would be pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2dbe210da8291f5fc2263323ec76a98e
http://arxiv.org/abs/2109.02760
http://arxiv.org/abs/2109.02760
Publikováno v:
Barlow, L, Bendiab, G, Shiaeles, S & Savage, N 2020, A novel approach to detect phishing attacks using binary visualisation and machine learning . in Proceedings-2020 IEEE World Congress on Services, SERVICES 2020 . IEEE SERVICES Proceedings Series, IEEE, pp. 177-182, 2020 IEEE World Congress on Services, Beijing, China, 18/10/20 . https://doi.org/10.1109/SERVICES48979.2020.00046
2020 IEEE World Congress on Services (SERVICES)
2020 IEEE World Congress on Services (SERVICES)
Protecting and preventing sensitive data from being used inappropriately has become a challenging task. Even a small mistake in securing data can be exploited by phishing attacks to release private information such as passwords or financial informati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fa55e06a1cb2715efb5f67b0285e3a8b
http://arxiv.org/abs/2108.13333
http://arxiv.org/abs/2108.13333
Publikováno v:
CSR
Data exfiltration is of increasing concern throughout the world. The number of incidents and capabilities of data exfiltration attacks are growing at an unprecedented rate. However, such attack vectors have not been deeply explored in the literature.
Publikováno v:
COMPSAC
Distributed denial of service (DDoS) attacks pose a huge threat to the Internet. Follow the rapid usage of the Internet of things (IoT), the DDoS attack is no longer a mere traffic attack, the original attack on the application layer surpasses the at