Zobrazeno 1 - 10
of 711
pro vyhledávání: '"Threat Analysis"'
Autor:
Corrado Battisti, Anna Testi, Giuliano Fanelli, Milvia Rastrelli, Pietro Giovacchini, Letizia Marsili
Publikováno v:
Conservation, Vol 4, Iss 3, Pp 395-401 (2024)
Anthropogenic threats impacting ecological targets should be mitigated and solved using fast and schematic tools useful in conservation strategies. Herein, we suggest a mixed and quick approach implementing coarse-grained (and expert-based) threat an
Externí odkaz:
https://doaj.org/article/3df11458b5704af5a3d62a712a1aded8
Autor:
Juan Pablo Perata, Gustavo Betarte
Publikováno v:
CLEI Electronic Journal, Vol 27, Iss 4 (2024)
This paper presents the results of a security assessment of FIWARE technology. We adopted an offensive perspective to identify vulnerabilities in deploying FIWARE components in specific architecture configurations. We identify security issues by expe
Externí odkaz:
https://doaj.org/article/c029d118ff034afa8e5e4f1d8ab7dac9
On Identification of Intrusive Applications: A Step Toward Heuristics-Based Adaptive Security Policy
Publikováno v:
IEEE Access, Vol 12, Pp 37586-37599 (2024)
Android is widely recognized as one of the leading mobile operating systems globally. As the popularity and usage of Android OS and third-party application stores continue to soar, the process of developing and publishing applications has become incr
Externí odkaz:
https://doaj.org/article/4cd2a721343e4558bc613c0c9005ef02
Publikováno v:
IEEE Access, Vol 12, Pp 1217-1234 (2024)
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for threat
Externí odkaz:
https://doaj.org/article/8f8556da6702483099b6c7bb5374dac6
Publikováno v:
Information, Vol 15, Iss 6, p 353 (2024)
Risk assessment is a critical sub-process in information security risk management (ISRM) that is used to identify an organization’s vulnerabilities and threats as well as evaluate current and planned security controls. Therefore, adequate resources
Externí odkaz:
https://doaj.org/article/fdc7d9590b094e85a5952802fc82aef0
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Masoud Alajmi, Hanan Abdullah Mengash, Hamed Alqahtani, Sumayh S. Aljameel, Manar Ahmed Hamza, Ahmed S. Salama
Publikováno v:
IEEE Access, Vol 11, Pp 127669-127678 (2023)
Threat detection in a Cyber-Physical System (CPS) platform is a key feature of ensuring the reliability and security of these connected methods, but digital elements interface with the physical world. CPS platforms are popular in sectors like healthc
Externí odkaz:
https://doaj.org/article/31fcc30b14db41ca9dd987979044b6ad
Publikováno v:
Complex & Intelligent Systems, Vol 9, Iss 3, Pp 3429-3468 (2022)
Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network functi
Externí odkaz:
https://doaj.org/article/72de70e3b2b14637ade6e74a4f7ca269
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.