Zobrazeno 1 - 10
of 66
pro vyhledávání: '"Ricardo J. Rodríguez"'
Publikováno v:
PeerJ Computer Science, Vol 10, p e1898 (2024)
Data privacy is one of the biggest challenges facing system architects at the system design stage. Especially when certain laws, such as the General Data Protection Regulation (GDPR), have to be complied with by cloud environments. In this article, w
Externí odkaz:
https://doaj.org/article/f9ec8f7ae232436fb8dad39db1e00c44
Publikováno v:
Cybersecurity, Vol 4, Iss 1, Pp 1-15 (2021)
Abstract Adversarial Malware Example (AME)-based adversarial training can effectively enhance the robustness of Machine Learning (ML)-based malware detectors against AME. AME quality is a key factor to the robustness enhancement. Generative Adversari
Externí odkaz:
https://doaj.org/article/6cd390847dbd4392914b322c5efd1529
Publikováno v:
IEEE Transactions on Vehicular Technology. 72:5181-5194
Unmanned aerial vehicle (UAV) and network function virtualization (NFV) facilitate the deployment of multi-access edge computing (MEC). In the UAV-based MEC (UMEC) network, virtualized network function (VNF) can be implemented as a lightweight contai
Autor:
Daniel Uroz, Ricardo J. Rodríguez
Publikováno v:
IEEE Internet of Things Journal. 9:19062-19072
Publikováno v:
Zaguán. Repositorio Digital de la Universidad de Zaragoza
instname
instname
File-based Time-of-Check to Time-of-Use (TOCTOU) race conditions are a well-known type of security vulnerability. A wide variety of techniques have been proposed to detect, mitigate, avoid, and exploit these vulnerabilities over the past 35 years. Ho
Publikováno v:
Forensic Science International: Digital Investigation. 44:301505
Publikováno v:
Zaguán. Repositorio Digital de la Universidad de Zaragoza
instname
instname
Availability of a common, shared benchmark to provide repeatable, quantifiable, and comparable results is an added value for any scientific community. International consortia provide benchmarks in a wide range of domains, being normally used by indus
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783031170805
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c5a5e50fdacb27f3fb72be2147001df3
https://doi.org/10.1007/978-3-031-17081-2_5
https://doi.org/10.1007/978-3-031-17081-2_5
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783031063640
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0168c9d7330d22d69f399c44f6c7992f
https://doi.org/10.1007/978-3-031-06365-7_1
https://doi.org/10.1007/978-3-031-06365-7_1
Autor:
Vicente Matellán, Alvaro Botas, M. T. Trobajo, Ricardo J. Rodríguez, Juan Francisco Sánchez García, Miguel V. Carriegos
Publikováno v:
Logic Journal of the IGPL. 28:473-486
Automatic public malware analysis services (PMAS, e.g. VirusTotal, Jotti or ClamAV, to name a few) provide controlled, isolated and virtual environments to analyse malicious software (malware) samples. Unfortunately, malware is currently incorporatin