Results 21 to 30 of about 1,413,174 (285)

Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks

open access: yesIEEE Access, 2021
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded devices.
Francesco Antognazza   +2 more
doaj   +1 more source

Constructing a Macro Virus to Upgrading Antivirus Programs [PDF]

open access: yesEngineering and Technology Journal, 2011
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. a macro virus is a virus that is written in a macro language, a language built into a software application such as a Word processor,
Wesam S. Bhaya, Alaa Abd Alhesain
doaj   +1 more source

Modeling Security Policy and the Effect for End-Users [PDF]

open access: yes, 2013
Many "good practices" in computer security are based on assumptions and local evidence that do not generalize. There are few quantifiable methods of establishing or refuting the validity of these practices from a user perspective.
Jones, K., Salako, K.
core   +1 more source

Human Factors in Security – Cybersecurity Education and Awareness of Business Students

open access: yesAnnales Universitatis Mariae Curie-Skłodowska Sectio H, Oeconomia, 2022
Theoretical background: The rapid development of Internet interactions and a growing number of information technology users caused by digital society development and accelerated by the COVID-19 pandemic yield the significant growth of cyber-attacks and ...
Łukasz Wiechetek, Marek Mędrek
doaj   +1 more source

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

Proposed Method to Enhance the Security of Blowfish Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2011
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems.
Shaimaa H. Shaker
doaj   +1 more source

Demystifying Blockchain Technology for Resource-Constrained IoT Devices: Parameters, Challenges and Future Perspective

open access: yesIEEE Access, 2021
One of the most promising enablers for the secure distributed operation of the Internet of Things (IoT) systems could be based on a mathematical construct widely known as blockchain that aims to neglect the system’s centralization and scalability ...
Inna Romashkova   +2 more
doaj   +1 more source

Monitoring the GDPR:European Symposium on Research in Computer Security [PDF]

open access: yes, 2019
The General Data Protection Regulation (GDPR) has substantially strengthened the requirements for data processing systems, requiring audits at scale. We show how and to what extent these audits can be automated.
A Masoumzadeh   +12 more
core   +1 more source

Computer Security

open access: yesCalifornian Journal of Health Promotion, 2005
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
openaire   +3 more sources

Analysis of the implications of digital voting through neutrosophic Delphi modeling [PDF]

open access: yesJournal of Fuzzy Extension and Applications
The modernization of electoral systems through digital technologies, such as electronic voting, has marked significant progress in emerging regions like Santo Domingo de los Tsáchilas, Ecuador.
Diego Pablo Palma Rivera   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy