Results 21 to 30 of about 157,721 (269)
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li +3 more
doaj +1 more source
Analyzing and Identifying Data Breaches in Underground Forums
Recently, underground forums play a crucial role in trading and exchanging leaked personal information. Meanwhile, the forums have been gradually used as data breaches' information sources. Therefore, it shows an upward trend in announcing the results of
Yong Fang +3 more
doaj +1 more source
TCCCD: Triplet-Based Cross-Language Code Clone Detection
Code cloning is a common practice in software development, where developers reuse existing code to accelerate programming speed and enhance work efficiency. Existing clone-detection methods mainly focus on code clones within a single programming language.
Yong Fang +3 more
doaj +1 more source
Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side [PDF]
The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side.
Buriachok, Volodymyr +7 more
core
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen +2 more
core +3 more sources
2 ...
openaire +2 more sources
CEPS Task Force on Artificial Intelligence and Cybersecurity Technology, Governance and Policy Challenges Task Force Evaluation of the HLEG Trustworthy AI Assessment List (Pilot Version). CEPS Task Force Report 22 January 2020 [PDF]
The Centre for European Policy Studies launched a Task Force on Artificial Intelligence (AI) and Cybersecurity in September 2019. The goal of this Task Force is to bring attention to the market, technical, ethical and governance challenges posed by the ...
Fantin, Stephano +2 more
core
To pay or not: game theoretic models of ransomware [PDF]
Ransomware is a type of malware that encrypts files and demands a ransom from victims. It can be viewed as a form of kidnapping in which the criminal takes control of the victim’s files with the objective of financial gain. In this article, we review and
August +38 more
core +1 more source
Autoscaled-Wavelet Convolutional Layer for Deep Learning-Based Side-Channel Analysis
Continuous Wavelet Transform (CWT) is rarely used in the field of side-channel analysis due to problems related to parameter (wavelet scale) selection; There is no way to find the optimal wavelet scale other than an exhaustive search, and the resulting ...
Daehyeon Bae +6 more
doaj +1 more source
Time-series regression models are essential components in unmanned aerial vehicles (UAVs) for accurate trajectory and state prediction. Nevertheless, they are still vulnerable to hybrid adversarial attacks, which can lead to a compromised mission ...
Bo Xu +9 more
doaj +1 more source

