Results 21 to 30 of about 110,621 (309)
Delta system transfer function model for IEMI time domain test [PDF]
Intentional electromagnetic interference (IEMI) is a serious threat to the stable operation of computer and other intelligent terminal equipment. For testing research on IEMI, it is very important to build a stable and reliable test system model for ...
Ma Rupo +3 more
doaj +1 more source
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-knowledge from these sources would provide security analysts with credible information, which they can use to detect or find patterns indicative of a cyber-attack.
Aritran Piplai +5 more
doaj +1 more source
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded devices.
Francesco Antognazza +2 more
doaj +1 more source
Human Factors in Security – Cybersecurity Education and Awareness of Business Students
Theoretical background: The rapid development of Internet interactions and a growing number of information technology users caused by digital society development and accelerated by the COVID-19 pandemic yield the significant growth of cyber-attacks and ...
Łukasz Wiechetek, Marek Mędrek
doaj +1 more source
Constructing a Macro Virus to Upgrading Antivirus Programs [PDF]
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. a macro virus is a virus that is written in a macro language, a language built into a software application such as a Word processor,
Wesam S. Bhaya, Alaa Abd Alhesain
doaj +1 more source
Analysis of the implications of digital voting through neutrosophic Delphi modeling [PDF]
The modernization of electoral systems through digital technologies, such as electronic voting, has marked significant progress in emerging regions like Santo Domingo de los Tsáchilas, Ecuador.
Diego Pablo Palma Rivera +3 more
doaj +1 more source
Keamanan pada Grid Computing~Survey Paper
Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. Grid computing is currently in the midst of evolving standards, inheriting and customizing from those developed in the high performance ...
Ghufran Ibnu Yasa
doaj +1 more source
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece +18 more
wiley +1 more source
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
openaire +3 more sources
Some Fundamental Cybersecurity Concepts
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios.
Kelce S. Wilson, Muge Ayse Kiy
doaj +1 more source

