Zobrazeno 1 - 7
of 7
pro vyhledávání: '"security datasets"'
There are various approaches to executing security breaches which are nowadays massively occurring in electronic communication environments, and phishing attacks are one of the most applied ones. A vast majority of phishing attacks are initiated usin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=57a035e5b1ae::2701bbc50fda3db41f42f0529946adec
https://www.bib.irb.hr/1277746
https://www.bib.irb.hr/1277746
Autor:
Steffen Wendzel, Luca Caviglione, Aleksandra Mileva, Jean-Francois Lalande, Wojciech Mazurczyk
Publikováno v:
IT. Information technology
64 (2022): 1–3. doi:10.1515/itit-2022-0016
info:cnr-pdr/source/autori:S. Wendzel, L. Caviglione, A. Mileva, J.-F. Lalande, W. Mazurczyk/titolo:Guest Editorial: Information Security Methodology and Replication Studies/doi:10.1515%2Fitit-2022-0016/rivista:IT. Information technology (Print)/anno:2022/pagina_da:1/pagina_a:3/intervallo_pagine:1–3/volume:64
Information Technology
Information Technology, 2022, pp.1-3. ⟨10.1515/itit-2022-0016⟩
64 (2022): 1–3. doi:10.1515/itit-2022-0016
info:cnr-pdr/source/autori:S. Wendzel, L. Caviglione, A. Mileva, J.-F. Lalande, W. Mazurczyk/titolo:Guest Editorial: Information Security Methodology and Replication Studies/doi:10.1515%2Fitit-2022-0016/rivista:IT. Information technology (Print)/anno:2022/pagina_da:1/pagina_a:3/intervallo_pagine:1–3/volume:64
Information Technology
Information Technology, 2022, pp.1-3. ⟨10.1515/itit-2022-0016⟩
This special issue presents five articles that address the topic of replicability and scientific methodology in information security research, featuring two extended articles from the 2021 International Workshop on Information Security Methodology an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e32ba720fb5affc5d056d825ffe4c11c
https://publications.cnr.it/doc/466059
https://publications.cnr.it/doc/466059
Publikováno v:
Theoretical and Applied Cybersecurity; Том 4 № 1 (2022): Теоретична та прикладна кібербезпека
Theoretical and Applied Cybersecurity; Vol. 4 No. 1 (2022): Theoretical And Applied Cybersecurity
Theoretical and Applied Cybersecurity; Vol. 4 No. 1 (2022): Theoretical And Applied Cybersecurity
This research describes a comparison of the information diffusion model, built on the basis of cellular automata with the real statistics the dynamics of the use of terms from the field of cybersecurity in the information flows of the Internet. The i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c13bf8d3c82740fe35034b4bd7521d94
https://ela.kpi.ua/handle/123456789/55650
https://ela.kpi.ua/handle/123456789/55650
Publikováno v:
Mohasseb, A, Aziz, B, Jung, J & Lee, J 2020, ' Cyber security incidents analysis and classification in a case study of Korean enterprises ', Knowledge and Information Systems, vol. 62, no. 7, pp. 2917–2935 . https://doi.org/10.1007/s10115-020-01452-5
The increasing amount and complexity of Cyber security attacks in recent years have made text analysis and data mining techniques an important factor in discovering features of such attacks and detecting future security threats. In this paper, we rep
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4cebd4be913172ca7ce8a6dfc1174ddf
https://researchportal.port.ac.uk/ws/files/20271587/Mohasseb2020_Article_CyberSecurityIncidentsAnalysis.pdf
https://researchportal.port.ac.uk/ws/files/20271587/Mohasseb2020_Article_CyberSecurityIncidentsAnalysis.pdf
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.