Results 21 to 30 of about 5,949,154 (313)
Siber Suçların Siber Saldırılara Maruz Kalan Şirketlerin Hisse Senedi Fiyatları Üzerindeki Etkileri
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi dolandırıcılık ve ...
Barış Aksoy, Necati Alp Erilli
doaj +1 more source
Computer Multimedia Security Protection System Based on the Network Security Active Defense Model
In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development.
Yanhong Shang, Jing Zhang
doaj +1 more source
Computer security is an important part of the computer science (CS) curriculum in all kinds of universities. Although the educational approach tends to be highly technical and practical, it cannot be avoided that some understanding and memorizing of the ...
Joan Arnedo-Moreno, Victor Garcia-Font
doaj +1 more source
Towards operational measures of computer security [PDF]
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S. +8 more
core +2 more sources
Intimate partner abusers use technology to track, monitor, harass, and otherwise harm their victims, and prior work reports that victims have few resources for obtaining help with such attacks.
D. Freed +6 more
semanticscholar +1 more source
Temporal Segment Connection Network for Action Recognition
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li +4 more
doaj +1 more source
The protection of information against electromagnetic penetration is one of the most important aspects related to the protection of information against its non-invasive acquisition. Compared to the activities of cybercriminals, the use of electromagnetic
Ireneusz Kubiak, Artur Przybysz
doaj +1 more source
SECURITY OF TEACHING ACTIVITIES ONLINE [PDF]
The current pandemic context has led to the rapid transition of all online teaching activities, and the security of all activities has become vulnerable, largely due to limited awareness by students and teachers, creating a security breach through the ...
CARINA-ELENA STEGĂROIU +2 more
doaj
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded devices.
Francesco Antognazza +2 more
doaj +1 more source
Computer-Security-Oriented Escape Room
Every day, new types of attacks are being developed with companies as their targets. If employees are not aware of the consequences and tactics of such attacks, they cannot protect the companies that employ them.
Erwan Béguin +10 more
semanticscholar +1 more source

