Results 81 to 90 of about 52,803 (214)

OnionBots: Subverting Privacy Infrastructure for Cyber Attacks

open access: yes, 2015
Over the last decade botnets survived by adopting a sequence of increasingly sophisticated strategies to evade detection and take overs, and to monetize their infrastructure. At the same time, the success of privacy infrastructures such as Tor opened the
Noubir, Guevara, Sanatinia, Amirali
core   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Cyber Attacks and Combat Behavior [PDF]

open access: yesOvidius University Annals: Economic Sciences Series, 2017
Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages.
Carataș Maria Alina   +2 more
doaj  

The Need for International Laws of War to Include Cyber Attacks Involving State and Non-State Actors [PDF]

open access: yes, 2013
This article argues that existing international laws of war are inadequate and need to be adjusted and clearly defined to include cyber attacks involving state and non-state actors. Part II of this article describes the different forms and increasing use
DeLuca, Christopher D.
core   +1 more source

ECOSTRESS‐derived semi‐arid forest temperature and evapotranspiration estimates demonstrate drought and thinning impacts

open access: yesRemote Sensing in Ecology and Conservation, EarlyView.
This study demonstrates that ECOSTRESS lands surface temperature (LST) data are sensitive to forest thinning, regional drought, and their interaction. Consistent with high‐resolution UAV images, ECOSTRESS LST data indicate thinned forest had significantly greater temperature across years.
Temuulen Tsagaan Sankey   +9 more
wiley   +1 more source

Resort to Self-Defense Against Cyber Attacks by Non-State Actors in International Law10.22133/mtlj.2025.424362.1265 [PDF]

open access: yesحقوق فناوریهای نوین
In the discussion of resorting to Self defenseSelf-defense against cyber attackscyber-attacks by non-State actors, at first it must be determined that for what type of cyber attackcyber-attack the right to Self defenseSelf-defense is allowed.
parviz farshasaid, Mahmoud Jalali
doaj   +1 more source

Defending Against Firmware Cyber Attacks on Safety-Critical Systems [PDF]

open access: yes, 2017
In the past, it was not possible to update the underlying software in many industrial control devices. Engineering teams had to ‘rip and replace’ obsolete components.
Barker, Tom   +5 more
core  

Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things

open access: yes, 2017
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission.
Ferdowsi, Aidin, Saad, Walid
core   +1 more source

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

Cyber Attack Detection

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets.
Prof. Kaustubh Shinde   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy