Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Olga Angelopoulou"'
This paper presents a systematic literature review (SLR) on cybersecurity in the automotive industry. Using the R tool Bibliometrix, a total of 537 papers related to cybersecurity and the automotive industry were analyzed. First, our paper contribute
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::72a8fa66bba905d899b4c32072a3d2f7
http://wrap.warwick.ac.uk/168110/1/WRAP-cybersecurity-automotive-industry-systematic-literature-review-(SLR)-Fernandez-de-Arroyabe-2022.pdf
http://wrap.warwick.ac.uk/168110/1/WRAP-cybersecurity-automotive-industry-systematic-literature-review-(SLR)-Fernandez-de-Arroyabe-2022.pdf
Autor:
Ornella Corazza, H Banayoti, Tim McSweeney, Honor Townshend, Attilio Negri, O Bowden-Jones, Olga Angelopoulou, Mariya Prilutskaya
Publikováno v:
The International journal on drug policy. 91
Background In an age of global insecurity, highly potent synthetic drugs have become a major public health issue. Their online advertisement and sale are facilitated by surface web, darknet markets and social media fuelling substance abuse and addict
This study was an investigation into the level and type of information that remained on memory cards (SD, Micro SD) that were purchased from the second hand market in the UK in 2018. The storage capacity of memory cards has continued to increase in c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::21439b3810523b745930df5469cdbe2c
http://wrap.warwick.ac.uk/137915/7/WRAP-survey-data-remaining-second-hand-memory-cards-UK-Angelopoulou-2019.pdf
http://wrap.warwick.ac.uk/137915/7/WRAP-survey-data-remaining-second-hand-memory-cards-UK-Angelopoulou-2019.pdf
Publikováno v:
Soft Computing. 21:233-243
The identification of non-genuine or malicious messages poses a variety of challenges due to the continuous changes in the techniques utilised by cyber-criminals. In this article, we propose a hybrid detection method based on a combination of image a
Publikováno v:
iThings/GreenCom/CPSCom/SmartData
The Internet of Things (IoT) is gaining momentum as billions of devices and wirelessly connected systems will soon be adopting various IoT technologies and exchanging potentially sensitive information. IoT devices can be deployed and linked to cloud
Autor:
Olga Angelopoulou, Stilianos Vidalis
Publikováno v:
Information Security Journal: A Global Perspective. 22:151-158
In this paper we discuss Maneuver Warfare operations using cloud computing resources and how this can be utilized as part of a 21st century information security model used by the modern SME, operating at a national and international level. Proactive
Publikováno v:
ARES
Cloud computing has gained popularity due to its efficiency, robustness and cost effectiveness. Carrying out digital forensic investigations in the cloud is currently a relevant and open issue. The root of this issue is the fact that servers cannot b
Autor:
Olga Angelopoulou, Richard Hill
Publikováno v:
2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.
Publikováno v:
EIDWT
This paper aims to provide an initial point of reference for future research within the field of recovering files from virtual machines. We discuss the current methods of file recovery from a physical machine, we define virtualization, and expand on