Zobrazeno 1 - 10
of 71
pro vyhledávání: '"Savage, Nick"'
Autor:
Braker, Christopher, Shiaeles, Stavros, Bendiab, Gueltoum, Savage, Nick, Limniotis, Konstantinos
Publikováno v:
NEW2AN 2020, ruSMART 2020: Internet of Things, Smart Spaces, and Next Generation Networks and Systems pp 165-175
The openness feature of Twitter allows programs to generate and control Twitter accounts automatically via the Twitter API. These accounts, which are known as bots, can automatically perform actions such as tweeting, re-tweeting, following, unfollowi
Externí odkaz:
http://arxiv.org/abs/2109.03710
Publikováno v:
NEW2AN 2020, ruSMART 2020: Internet of Things, Smart Spaces, and Next Generation Networks and Systems pp 205-216
The personal photos captured and submitted by users on social networks can provide several interesting insights about the location of the user, which is a key indicator of their daily activities. This information is invaluable for security organisati
Externí odkaz:
http://arxiv.org/abs/2109.03344
Network traffic generators are invaluable tools that allow for applied experimentation to evaluate the performance of networks, infrastructure, and security controls, by modelling and simulating the communication packets and payloads that would be pr
Externí odkaz:
http://arxiv.org/abs/2109.02760
Publikováno v:
2020 IEEE World Congress on Services (SERVICES)
Protecting and preventing sensitive data from being used inappropriately has become a challenging task. Even a small mistake in securing data can be exploited by phishing attacks to release private information such as passwords or financial informati
Externí odkaz:
http://arxiv.org/abs/2108.13333
Publikováno v:
2021 IEEE International Conference on Communications Workshops (ICC Workshops)
The rise of the subscription-based business model has led to a corresponding increase in the number of subscriptions where a customer needs to manage their payments. This management of payments for multiple subscriptions has become a very complicated
Externí odkaz:
http://arxiv.org/abs/2108.12705
Autor:
Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Boongoen, Tossapon, Iam-On, Natthakan
Publikováno v:
In Forensic Science International: Digital Investigation June 2021 37
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Boongoen, Tossapon, Iam-On, Natthakan, Naik, Kshirasagar, Song, Jingping
The YARA rules technique is used in cybersecurity to scan for malware, often in its default form, where rules are created either manually or automatically. Creating YARA rules that enable analysts to label files as suspected malware is a highly techn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=core_ac_uk__::f6ccf0f5faf5e9dc4678c86b846f2582
https://publications.aston.ac.uk/id/eprint/42106/1/Embedded_YARA_rules_strengthening_YARA_rules_utilising_fuzzy_hashing_and_fuzzy_rules_for_malware_analysis.pdf
https://publications.aston.ac.uk/id/eprint/42106/1/Embedded_YARA_rules_strengthening_YARA_rules_utilising_fuzzy_hashing_and_fuzzy_rules_for_malware_analysis.pdf
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.