Results 11 to 20 of about 181,953 (301)
Кибербезопасность в образовательных сетях [PDF]
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr +7 more
core +1 more source
Flow Context and Host Behavior Based Shadowsocks’s Traffic Identification
Cloud Virtual Private Server (VPS) services provide the chance of rapid deployment of anonymous proxy services, becoming an important part of many anonymous proxy solutions.
Xuemei Zeng +6 more
doaj +1 more source
Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function
This work details the theory and implementation of a multi-wavelength quantum key distribution (QKD) emulation system with a physical unclonable function (PUF).
Brit Riggs +6 more
doaj +1 more source
Android Malware Familial Classification Based on DEX File Section Features
The rapid proliferation of Android malware is challenging the classification of the Android malware family. The traditional static method for classification is easily affected by the confusion and reinforcement, while the dynamic method is expensive in ...
Yong Fang +3 more
doaj +1 more source
Artificial intelligence in the cyber domain: Offense and defense [PDF]
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao +2 more
core +1 more source
A Novel Hybrid Model for Cantonese Rumor Detection on Twitter
The development of information technology and mobile Internet has spawned the prosperity of online social networks. As the world’s largest microblogging platform, Twitter is popular among people all over the world.
Xinyu Chen +4 more
doaj +1 more source
Emergent Behavior in Cybersecurity [PDF]
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core +1 more source
Unbalanced Web Phishing Classification through Deep Reinforcement Learning
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are ...
Antonio Maci +3 more
doaj +1 more source
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Although the methods of confrontation are continually being updated, the results of those methods are not very satisfactory at present ...
Yong Fang +4 more
doaj +1 more source
Developing and evaluating cybersecurity competencies for students in computing programs [PDF]
Changes due to technological development in the workplace are putting pressure on academia to keep pace with the changing nature of work. Due to the growing need for cybersecurity professionals, universities improve their cybersecurity programs to ...
Abdullah Alammari +2 more
doaj +2 more sources

