Results 21 to 30 of about 164,979 (324)
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Although the methods of confrontation are continually being updated, the results of those methods are not very satisfactory at present ...
Yong Fang +4 more
doaj +1 more source
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li +3 more
doaj +1 more source
Institutional Strategies for Cybersecurity in Higher Education Institutions
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations. Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity issues are receiving greater attention.
Eric C. K. Cheng, Tianchong Wang
doaj +1 more source
Analyzing and Identifying Data Breaches in Underground Forums
Recently, underground forums play a crucial role in trading and exchanging leaked personal information. Meanwhile, the forums have been gradually used as data breaches' information sources. Therefore, it shows an upward trend in announcing the results of
Yong Fang +3 more
doaj +1 more source
Malware Classification Based on Shallow Neural Network
The emergence of a large number of new malicious code poses a serious threat to network security, and most of them are derivative versions of existing malicious code.
Pin Yang +4 more
doaj +1 more source
Demythifying Cybersecurity [PDF]
A large part of computer security education is tackling myths that support much of the practice in the field. By examining these myths and the underlying truths or heuristics they reflect, we learn three things. First, students and practitioners learn to separate what is empirically and theoretically supported from what is supported solely by untested ...
Talbot, Edward +2 more
openaire +3 more sources
Кибербезопасность в образовательных сетях [PDF]
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr +7 more
core +1 more source
Abstract Deepthi Ratnayake MBCS, Senior Lecturer in Computer Science, explains the Colonial Pipeline attack that revolutionised ransomware landscape.
openaire +1 more source
TCCCD: Triplet-Based Cross-Language Code Clone Detection
Code cloning is a common practice in software development, where developers reuse existing code to accelerate programming speed and enhance work efficiency. Existing clone-detection methods mainly focus on code clones within a single programming language.
Yong Fang +3 more
doaj +1 more source
CEPS Task Force on Artificial Intelligence and Cybersecurity Technology, Governance and Policy Challenges Task Force Evaluation of the HLEG Trustworthy AI Assessment List (Pilot Version). CEPS Task Force Report 22 January 2020 [PDF]
The Centre for European Policy Studies launched a Task Force on Artificial Intelligence (AI) and Cybersecurity in September 2019. The goal of this Task Force is to bring attention to the market, technical, ethical and governance challenges posed by the ...
Fantin, Stephano +2 more
core

