Results 21 to 30 of about 181,953 (301)

Malware Classification Based on Shallow Neural Network

open access: yesFuture Internet, 2020
The emergence of a large number of new malicious code poses a serious threat to network security, and most of them are derivative versions of existing malicious code.
Pin Yang   +4 more
doaj   +1 more source

The gamification of cybersecurity training [PDF]

open access: yes, 2017
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie   +7 more
core   +2 more sources

Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining

open access: yesApplied Sciences, 2020
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li   +3 more
doaj   +1 more source

Analyzing and Identifying Data Breaches in Underground Forums

open access: yesIEEE Access, 2019
Recently, underground forums play a crucial role in trading and exchanging leaked personal information. Meanwhile, the forums have been gradually used as data breaches' information sources. Therefore, it shows an upward trend in announcing the results of
Yong Fang   +3 more
doaj   +1 more source

TCCCD: Triplet-Based Cross-Language Code Clone Detection

open access: yesApplied Sciences, 2023
Code cloning is a common practice in software development, where developers reuse existing code to accelerate programming speed and enhance work efficiency. Existing clone-detection methods mainly focus on code clones within a single programming language.
Yong Fang   +3 more
doaj   +1 more source

CEPS Task Force on Artificial Intelligence and Cybersecurity Technology, Governance and Policy Challenges Task Force Evaluation of the HLEG Trustworthy AI Assessment List (Pilot Version). CEPS Task Force Report 22 January 2020 [PDF]

open access: yes, 2020
The Centre for European Policy Studies launched a Task Force on Artificial Intelligence (AI) and Cybersecurity in September 2019. The goal of this Task Force is to bring attention to the market, technical, ethical and governance challenges posed by the ...
Fantin, Stephano   +2 more
core  

Trusted CI Experiences in Cybersecurity and Service to Open Science

open access: yes, 2019
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew   +18 more
core   +1 more source

Cybersecurity dynamics

open access: yesProceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
2 ...
openaire   +2 more sources

“Passwords protect my stuff” - a study of children’s password practices [PDF]

open access: yes, 2019
Children use technology from a very young age and often have to authenticate. The goal of this study is to explore children’s practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world’s cyber posture and
Choong, Yee-Yin   +3 more
core   +3 more sources

Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads

open access: yesApplied Sciences, 2020
With the development of internet technology, email has become the formal communication method in modern society. Email often contains a large amount of personal privacy information, possible business agreements, and sensitive attachments, which make ...
Yong Fang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy