Results 31 to 40 of about 164,979 (324)

“Passwords protect my stuff” - a study of children’s password practices [PDF]

open access: yes, 2019
Children use technology from a very young age and often have to authenticate. The goal of this study is to explore children’s practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world’s cyber posture and
Choong, Yee-Yin   +3 more
core   +2 more sources

Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads

open access: yesApplied Sciences, 2020
With the development of internet technology, email has become the formal communication method in modern society. Email often contains a large amount of personal privacy information, possible business agreements, and sensitive attachments, which make ...
Yong Fang   +3 more
doaj   +1 more source

ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM

open access: yesArena Hukum, 2022
Wannacry Ransomware epidemics have attacked several high-profile companies in European Union creating an EU-wide cybersecurity crisis in the digital economy and social order.
Safrida Ananda, Ika Putranti, Andi Dir
doaj   +1 more source

A Neural Network-Based Approach for Cryptographic Function Detection in Malware

open access: yesIEEE Access, 2020
Cryptographic technology has been commonly used in malware for hiding their static characteristics and malicious behaviors to avoid the detection of anti-virus engines and counter the reverse analysis from security researchers.
Li Jia   +5 more
doaj   +1 more source

Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity [PDF]

open access: yes, 2019
31 pages. Chapter in Springer 2019 book entitled "Proactive and Dynamic Network Defense"
openaire   +2 more sources

Trusted CI Experiences in Cybersecurity and Service to Open Science

open access: yes, 2019
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew   +18 more
core   +1 more source

Cybersecurity Risks in a Pandemic [PDF]

open access: yesJournal of Medical Internet Research, 2020
Cybersecurity threats are estimated to cost the world US $6 trillion a year by 2021, and the number of attacks has increased five-fold after COVID-19. Although there is substantial literature on the threats technological vulnerabilities have on the health care industry, less research exists on how pandemics like COVID-19 are opportunistic for ...
Christina Meilee Williams   +2 more
openaire   +4 more sources

Cybersecurity regulation: cybersecurity certification of operational technologies

open access: yesTechnology audit and production reserves, 2021
The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification.
openaire   +3 more sources

The gamification of cybersecurity training [PDF]

open access: yes, 2017
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie   +7 more
core   +2 more sources

Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach

open access: yesIEEE Access, 2019
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous and distributed systems, and it has increasingly become a ubiquitous computing service platform.
Xiang Li   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy