Zobrazeno 1 - 10
of 304
pro vyhledávání: '"Web threat"'
Autor:
KHAOULA HIDAWI
The Internet has become an indispensable component of our daily social and financial lives. Nonetheless, internet users may be subject to a variety of web threats that can result in financial losses, identity theft, data loss, and brand reputation da
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::379c419e10b8cf622a039a62bc1e8944
Publikováno v:
EURASIAN INTEGRATION: economics, law, politics. 14:50-55
The article is devoted to the study of countering international extremist activity features, including the intensifying corresponding Internet threats. The author notes that in modern conditions, threats of extremism require an integrated approach at
Autor:
Daniela Oliveira, Hojjat Aghakhani, Paulo Licio de Geus, Christopher Kruegel, André Grégio, Giovanni Vigna, Marcus Botacin, Stefano Ortolani
Publikováno v:
ACM Transactions on Privacy and Security. 24:1-31
Malware analysis is an essential task to understand infection campaigns, the behavior of malicious codes, and possible ways to mitigate threats. Malware analysis also allows better assessment of attackers’ capabilities, techniques, and processes. A
Autor:
Yassine Maleh, Yassine Sadqi
Publikováno v:
Information Security Journal: A Global Perspective. 31:1-27
Nowadays, web application security is one of the relevant issues in the IT security domain due to the continued growth in the number of web-related attacks. As a result, attacks, with various and v...
Publikováno v:
DocEng
We present an overview of the field of malware analysis with emphasis on issues related to document engineering. We will introduce the field with a discussion of the types of malware, including executable binaries, malicious PDFs, polymorphic malware
Autor:
Gerardo Gómez-García, René Szotkowski, Kamil Kopecký, Klára Mikulcová, Francisco-Domingo Fernández-Martín
Publikováno v:
International Journal of Environmental Research and Public Health, Vol 18, Iss 8352, p 8352 (2021)
International Journal of Environmental Research and Public Health
Digibug. Repositorio Institucional de la Universidad de Granada
instname
Volume 18
Issue 16
International Journal of Environmental Research and Public Health
Digibug. Repositorio Institucional de la Universidad de Granada
instname
Volume 18
Issue 16
Today’s young people spend most of their time in contact with mobile devices. Their excessive use carries many risks, such as addiction, cyberbullying and social disruption. Based on this, this study analysed the mobile phone use of young Czechs be
Autor:
Paulina Kuzior, Monika Štrbová
Publikováno v:
Management Systems in Production Engineering. 27:88-92
Contemporary world brings people more and more dangers. Creation of the Internet made it even easier to harm other users without consequences. However we still can do something about it. We can learn how to protect ourselves in the network. That is w
Autor:
Marinela I. Grudeva, Nadezhda Yu. Kostyunina, Liliia Agzamovna Latypova, Natalya N. Kalatskaya
Publikováno v:
RUA. Repositorio Institucional de la Universidad de Alicante
Universidad de Alicante (UA)
Universidad de Alicante (UA)
The object of this paper is to study the negative impact of Internet sites on the psyche of young people, to identify the facts of unsafe use of the Internet by students leading to the development of cyber addiction and victim behavior. The article i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cccf58517dce1211b2ccaf2e2f3a0cab
http://hdl.handle.net/10045/116270
http://hdl.handle.net/10045/116270
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9783030707125
Dam management systems have risen as the most salient challenge of e-government in Iraq that needs IT infrastructure, data integrity, and user privacy protection versus the internet threats that rendering such critical infrastructures useless. This c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::31d43cc03736069f6ee25b809bfd6162
https://doi.org/10.1007/978-3-030-70713-2_76
https://doi.org/10.1007/978-3-030-70713-2_76
Autor:
Ali A. Mohammed, Dheyaa Jasim Kadhim
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, process
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a6b62bc5cc4c7d1e41347c1108a43679
https://zenodo.org/record/4137190
https://zenodo.org/record/4137190