Zobrazeno 1 - 10
of 365
pro vyhledávání: '"Yuval Elovici"'
Publikováno v:
IEEE Access, Vol 10, Pp 122399-122413 (2022)
Fingerprinting devices based on unique characteristics of their sensors is an important research direction nowadays due to its immediate impact on non-interactive authentications and no less due to privacy implications. In this work, we investigate s
Externí odkaz:
https://doaj.org/article/89ac47534d0d43988c0baf987ace0351
Publikováno v:
Sensors, Vol 23, Iss 8, p 4018 (2023)
During the COVID-19 pandemic, most organizations were forced to implement a work-from-home policy, and in many cases, employees have not been expected to return to the office on a full-time basis. This sudden shift in the work culture was accompanied
Externí odkaz:
https://doaj.org/article/3b1d62ee4f7e49a5a8311a04bc3ab4a7
Publikováno v:
IEEE Access, Vol 8, Pp 19997-20011 (2020)
In recent years, cyber-attacks against individuals, businesses, and organizations have increased. Cyber criminals are always looking for effective vectors to deliver malware to victims in order to launch an attack. Images are used on a daily basis by
Externí odkaz:
https://doaj.org/article/5c472c4a5db243ddb26c8ac146382333
Autor:
Matan Kintzlinger, Aviad Cohen, Nir Nissim, Moshe Rav-Acha, Vladimir Khalameizer, Yuval Elovici, Yuval Shahar, Amos Katz
Publikováno v:
IEEE Access, Vol 8, Pp 48123-48140 (2020)
Today, cardiac implantable electronic devices (CIEDs), such as pacemakers and implantable cardioverter defibrillators (ICDs), play an increasingly important role in healthcare ecosystems as patient life support devices. Physicians control, program an
Externí odkaz:
https://doaj.org/article/79852d96a2d74f18a6cc5032e4cec764
Publikováno v:
IEEE Access, Vol 7, Pp 110050-110073 (2019)
Researchers from academia and the corporate-sector rely on scholarly digital libraries to access articles. Attackers take advantage of innocent users who consider the articles' files safe and thus open PDF-files with little concern. In addition, rese
Externí odkaz:
https://doaj.org/article/62055ee500b141f69fd1627236c49265
Autor:
Jacob Gatlin, Sofia Belikovetsky, Samuel B. Moore, Yosef Solewicz, Yuval Elovici, Mark Yampolskiy
Publikováno v:
IEEE Access, Vol 7, Pp 133421-133432 (2019)
Additive manufacturing (AM), a.k.a. 3D printing is increasingly used to manufacture functional parts of safety-critical systems. The AM's dependence on computerization raises the concern that the AM process can be tampered with, and a part's mechanic
Externí odkaz:
https://doaj.org/article/2c59993a748948a6bbaed5c0b1df4087
Publikováno v:
Sensors, Vol 22, Iss 11, p 4259 (2022)
Radar systems are mainly used for tracking aircraft, missiles, satellites, and watercraft. In many cases, information regarding the objects detected by a radar system is sent to, and used by, a peripheral consuming system, such as a missile system or
Externí odkaz:
https://doaj.org/article/e796816c59e14db2b8e85d7d18c1e44a
Publikováno v:
Sensors, Vol 22, Iss 9, p 3580 (2022)
Driving under the influence of alcohol is a widespread phenomenon in the US where it is considered a major cause of fatal accidents. In this research, we present Virtual Breathalyzer, a novel approach for detecting intoxication from the measurements
Externí odkaz:
https://doaj.org/article/8ecf70cc9c394b70a0827c45dedbc614
Publikováno v:
Sensors, Vol 22, Iss 7, p 2608 (2022)
A Global Positioning System (GPS) spoofing attack can be launched against any commercial GPS sensor in order to interfere with its navigation capabilities. These sensors are installed in a variety of devices and vehicles (e.g., cars, planes, cell pho
Externí odkaz:
https://doaj.org/article/71320f2f332041cc9f77d7554b821f46
Publikováno v:
Data in Brief, Vol 26, Iss , Pp - (2019)
This article presents a dataset for studying the detection of obfuscated malware in volatile computer memory. Several obfuscated reverse remote shells were generated using Metasploit-Framework, Hyperion, and PEScrambler tools. After compromising the
Externí odkaz:
https://doaj.org/article/ff98a512f4424b969797a64f754a3d32