Results 11 to 20 of about 181,953 (301)

Кибербезопасность в образовательных сетях [PDF]

open access: yes, 2020
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr   +7 more
core   +1 more source

Flow Context and Host Behavior Based Shadowsocks’s Traffic Identification

open access: yesIEEE Access, 2019
Cloud Virtual Private Server (VPS) services provide the chance of rapid deployment of anonymous proxy services, becoming an important part of many anonymous proxy solutions.
Xuemei Zeng   +6 more
doaj   +1 more source

Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function

open access: yesCryptography, 2022
This work details the theory and implementation of a multi-wavelength quantum key distribution (QKD) emulation system with a physical unclonable function (PUF).
Brit Riggs   +6 more
doaj   +1 more source

Android Malware Familial Classification Based on DEX File Section Features

open access: yesIEEE Access, 2020
The rapid proliferation of Android malware is challenging the classification of the Android malware family. The traditional static method for classification is easily affected by the confusion and reinforcement, while the dynamic method is expensive in ...
Yong Fang   +3 more
doaj   +1 more source

Artificial intelligence in the cyber domain: Offense and defense [PDF]

open access: yes, 2020
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao   +2 more
core   +1 more source

A Novel Hybrid Model for Cantonese Rumor Detection on Twitter

open access: yesApplied Sciences, 2020
The development of information technology and mobile Internet has spawned the prosperity of online social networks. As the world’s largest microblogging platform, Twitter is popular among people all over the world.
Xinyu Chen   +4 more
doaj   +1 more source

Emergent Behavior in Cybersecurity [PDF]

open access: yes, 2014
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core   +1 more source

Unbalanced Web Phishing Classification through Deep Reinforcement Learning

open access: yesComputers, 2023
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are ...
Antonio Maci   +3 more
doaj   +1 more source

Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism

open access: yesIEEE Access, 2019
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Although the methods of confrontation are continually being updated, the results of those methods are not very satisfactory at present ...
Yong Fang   +4 more
doaj   +1 more source

Developing and evaluating cybersecurity competencies for students in computing programs [PDF]

open access: yesPeerJ Computer Science, 2022
Changes due to technological development in the workplace are putting pressure on academia to keep pace with the changing nature of work. Due to the growing need for cybersecurity professionals, universities improve their cybersecurity programs to ...
Abdullah Alammari   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy