Results 21 to 30 of about 37,859 (190)

A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports

open access: yesIEEE Access, 2020
Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence of smart airports. Services and systems powered by the IoT enable smart airports to have enhanced robustness, efficiency and control, governed by real-time ...
Nickolaos Koroniotis   +4 more
doaj   +1 more source

AppChainer: investigating the chainability among payloads in android applications

open access: yesCybersecurity, 2023
Statistics show that more than 80 applications are installed on each android smartphone. Vulnerability research on Android applications is of critical importance.
Xiaobo Xiang   +5 more
doaj   +1 more source

Person Re-Identification Method Based on Dual Descriptor Feature Enhancement

open access: yesEntropy, 2023
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin   +5 more
doaj   +1 more source

A Novel Hybrid Method for Effective Identification and Extraction of Digital Evidence Masked by Steganographic Techniques in WAV and MP3 Files

open access: yesJournal of Information Security and Cybercrimes Research, 2023
Anti-forensics techniques, particularly steganography and cryptography, have become increasingly pressing issues affecting current digital forensics practices. This paper advances the automation of hidden evidence extraction in audio files by proposing a
Mohamed Ghane   +4 more
doaj   +1 more source

Modeling and Analysis of the Spread of Malware with the Influence of User Awareness

open access: yesComplexity, 2021
By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness.
Qingyi Zhu, Xuhang Luo, Yuhang Liu
doaj   +1 more source

RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
Allocating resources is crucial in large-scale distributed computing, as networks of computers tackle difficult optimization problems. Within the scope of this discussion, the objective of resource allocation is to achieve maximum overall computing ...
Moses Ashawa   +3 more
doaj   +1 more source

YOLOAL: Focusing on the Object Location for Detection on Drone Imagery

open access: yesIEEE Access, 2023
Object detection in drone-captured scenarios, which can be considered as a task of detecting dense small objects, is still a challenge. Drones navigate at different altitudes, causing significant changes in the size of the detected objects and posing a ...
Xinting Chen   +4 more
doaj   +1 more source

Attribution of Cyber Attacks on Industrial Control Systems [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2016
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national governments can decide on ...
Allan Cook   +4 more
doaj   +1 more source

Hate Speech Detection Using Machine Learning: A Survey

open access: yesAcademy Journal of Science and Engineering, 2023
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,   +7 more
doaj  

Memory access integrity: detecting fine-grained memory access errors in binary code

open access: yesCybersecurity, 2019
As one of the most notorious programming errors, memory access errors still hurt modern software security. Particularly, they are hidden deeply in important software systems written in memory unsafe languages like C/C++. Plenty of work have been proposed
Wenjie Li   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy