Results 21 to 30 of about 164,979 (324)

Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism

open access: yesIEEE Access, 2019
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Although the methods of confrontation are continually being updated, the results of those methods are not very satisfactory at present ...
Yong Fang   +4 more
doaj   +1 more source

Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining

open access: yesApplied Sciences, 2020
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li   +3 more
doaj   +1 more source

Institutional Strategies for Cybersecurity in Higher Education Institutions

open access: yesInformation, 2022
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations. Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity issues are receiving greater attention.
Eric C. K. Cheng, Tianchong Wang
doaj   +1 more source

Analyzing and Identifying Data Breaches in Underground Forums

open access: yesIEEE Access, 2019
Recently, underground forums play a crucial role in trading and exchanging leaked personal information. Meanwhile, the forums have been gradually used as data breaches' information sources. Therefore, it shows an upward trend in announcing the results of
Yong Fang   +3 more
doaj   +1 more source

Malware Classification Based on Shallow Neural Network

open access: yesFuture Internet, 2020
The emergence of a large number of new malicious code poses a serious threat to network security, and most of them are derivative versions of existing malicious code.
Pin Yang   +4 more
doaj   +1 more source

Demythifying Cybersecurity [PDF]

open access: yesIEEE Security & Privacy Magazine, 2010
A large part of computer security education is tackling myths that support much of the practice in the field. By examining these myths and the underlying truths or heuristics they reflect, we learn three things. First, students and practitioners learn to separate what is empirically and theoretically supported from what is supported solely by untested ...
Talbot, Edward   +2 more
openaire   +3 more sources

Кибербезопасность в образовательных сетях [PDF]

open access: yes, 2020
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr   +7 more
core   +1 more source

Insight: Cybersecurity

open access: yesITNOW, 2021
Abstract Deepthi Ratnayake MBCS, Senior Lecturer in Computer Science, explains the Colonial Pipeline attack that revolutionised ransomware landscape.
openaire   +1 more source

TCCCD: Triplet-Based Cross-Language Code Clone Detection

open access: yesApplied Sciences, 2023
Code cloning is a common practice in software development, where developers reuse existing code to accelerate programming speed and enhance work efficiency. Existing clone-detection methods mainly focus on code clones within a single programming language.
Yong Fang   +3 more
doaj   +1 more source

CEPS Task Force on Artificial Intelligence and Cybersecurity Technology, Governance and Policy Challenges Task Force Evaluation of the HLEG Trustworthy AI Assessment List (Pilot Version). CEPS Task Force Report 22 January 2020 [PDF]

open access: yes, 2020
The Centre for European Policy Studies launched a Task Force on Artificial Intelligence (AI) and Cybersecurity in September 2019. The goal of this Task Force is to bring attention to the market, technical, ethical and governance challenges posed by the ...
Fantin, Stephano   +2 more
core  

Home - About - Disclaimer - Privacy