Results 21 to 30 of about 5,949,154 (313)

Siber Suçların Siber Saldırılara Maruz Kalan Şirketlerin Hisse Senedi Fiyatları Üzerindeki Etkileri

open access: yesİşletme Bilimi Dergisi, 2021
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi dolandırıcılık ve ...
Barış Aksoy, Necati Alp Erilli
doaj   +1 more source

Computer Multimedia Security Protection System Based on the Network Security Active Defense Model

open access: yesAdvances in Multimedia, 2021
In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development.
Yanhong Shang, Jing Zhang
doaj   +1 more source

A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security

open access: yesApplied Sciences, 2021
Computer security is an important part of the computer science (CS) curriculum in all kinds of universities. Although the educational approach tends to be highly technical and practical, it cannot be avoided that some understanding and memorizing of the ...
Joan Arnedo-Moreno, Victor Garcia-Font
doaj   +1 more source

Towards operational measures of computer security [PDF]

open access: yes, 1993
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S.   +8 more
core   +2 more sources

"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence

open access: yesProc. ACM Hum. Comput. Interact., 2019
Intimate partner abusers use technology to track, monitor, harass, and otherwise harm their victims, and prior work reports that victims have few resources for obtaining help with such attacks.
D. Freed   +6 more
semanticscholar   +1 more source

Temporal Segment Connection Network for Action Recognition

open access: yesIEEE Access, 2020
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li   +4 more
doaj   +1 more source

Measurements and Correctness Criteria for Determining the Line Length of the Data Image Obtained in the Process of Electromagnetic Infiltration

open access: yesApplied Sciences, 2022
The protection of information against electromagnetic penetration is one of the most important aspects related to the protection of information against its non-invasive acquisition. Compared to the activities of cybercriminals, the use of electromagnetic
Ireneusz Kubiak, Artur Przybysz
doaj   +1 more source

SECURITY OF TEACHING ACTIVITIES ONLINE [PDF]

open access: yesAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie, 2021
The current pandemic context has led to the rapid transition of all online teaching activities, and the security of all activities has become vulnerable, largely due to limited awareness by students and teachers, creating a security breach through the ...
CARINA-ELENA STEGĂROIU   +2 more
doaj  

Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks

open access: yesIEEE Access, 2021
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded devices.
Francesco Antognazza   +2 more
doaj   +1 more source

Computer-Security-Oriented Escape Room

open access: yesIEEE Security and Privacy, 2019
Every day, new types of attacks are being developed with companies as their targets. If employees are not aware of the consequences and tactics of such attacks, they cannot protect the companies that employ them.
Erwan Béguin   +10 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy