Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Terézia Mézešová"'
Publikováno v:
Journal of Universal Computer Science, Vol 25, Iss 11, Pp 1417-1436 (2019)
With the number of Internet of Things devices increasing, also the number of vulnerable devices connected to the Internet increases. These devices can become part of botnets and cause damage to the Internet infrastructure. In this paper we study teln
Externí odkaz:
https://doaj.org/article/dfd5a25e7267417db91cf0d165f5dd6b
Publikováno v:
Information, Vol 11, Iss 11, p 537 (2020)
The rapid move to digitalization and usage of online information systems brings new and evolving threats that organizations must protect themselves from and respond to. Monitoring an organization’s network for malicious activity has become a standa
Externí odkaz:
https://doaj.org/article/1f1bde886a13434dae307150f0c328de
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030903206
Lecture Notes in Networks and Systems
Lecture Notes in Networks and Systems
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3857e93c0a0752ec31fba556e2068db0
https://doi.org/10.1007/978-3-030-90321-3_65
https://doi.org/10.1007/978-3-030-90321-3_65
Autor:
Katarína Amrichová, Terézia Mézešová
Publikováno v:
CECC
Computer programs often work with a variety of sensitive data and class String is widely used in object-oriented programming languages for this purpose. However, saving sensitive data to a String object is not safe as it is not encrypted and may stil
Publikováno v:
2019 IEEE 15th International Scientific Conference on Informatics.
Usage of cybersecurity tools entails an enormous amount of data that brings the possibility of different approaches to the processing of cybersecurity data. This paper discusses the profiling of attackers, which, in practice, can help in managing cyb
Publikováno v:
2019 IEEE 15th International Scientific Conference on Informatics.
An inherent part of everyday life and work on a computer is ownership and use of an email address. The main aim of this paper is to analyze existing approaches to classification of malicious emails. We have implemented a system, which is able to dist
Publikováno v:
Recent Developments on Industrial Control Systems Resilience ISBN: 9783030313272
Industrial Control Systems are a prestigious target for attackers and the attacks are becoming more sophisticated. Intrusion detection systems can uncover suspicious activity and point towards steps of attacks. Detection systems raise an overwhelming
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f14479b0a623c4618a37706e2d7af513
https://doi.org/10.1007/978-3-030-31328-9_8
https://doi.org/10.1007/978-3-030-31328-9_8
Autor:
Hayretdin Bahsi, Terézia Mézešová
Publikováno v:
Cyber Security
Attack graphs deduce the attack paths based on the identified vulnerabilities, the existing network topology, and the applied network access controls. The exploitation likelihood of the paths derived from the Common Vulnerability Scoring System (CVSS
Publikováno v:
2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
Information security risks caused by difficult to exploit vulnerabilities are often treated with countermeasures as last due to their low likelihood of occurrence and should be given a high priority in security monitoring. In this paper, we propose a
Publikováno v:
Information, Vol 11, Iss 537, p 537 (2020)
Information
Volume 11
Issue 11
Information
Volume 11
Issue 11
The rapid move to digitalization and usage of online information systems brings new and evolving threats that organizations must protect themselves from and respond to. Monitoring an organization&rsquo
s network for malicious activity has become
s network for malicious activity has become