Results 31 to 40 of about 164,979 (324)
“Passwords protect my stuff” - a study of children’s password practices [PDF]
Children use technology from a very young age and often have to authenticate. The goal of this study is to explore children’s practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world’s cyber posture and
Choong, Yee-Yin +3 more
core +2 more sources
Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads
With the development of internet technology, email has become the formal communication method in modern society. Email often contains a large amount of personal privacy information, possible business agreements, and sensitive attachments, which make ...
Yong Fang +3 more
doaj +1 more source
ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM
Wannacry Ransomware epidemics have attacked several high-profile companies in European Union creating an EU-wide cybersecurity crisis in the digital economy and social order.
Safrida Ananda, Ika Putranti, Andi Dir
doaj +1 more source
A Neural Network-Based Approach for Cryptographic Function Detection in Malware
Cryptographic technology has been commonly used in malware for hiding their static characteristics and malicious behaviors to avoid the detection of anti-virus engines and counter the reverse analysis from security researchers.
Li Jia +5 more
doaj +1 more source
Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity [PDF]
31 pages. Chapter in Springer 2019 book entitled "Proactive and Dynamic Network Defense"
openaire +2 more sources
Trusted CI Experiences in Cybersecurity and Service to Open Science
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew +18 more
core +1 more source
Cybersecurity Risks in a Pandemic [PDF]
Cybersecurity threats are estimated to cost the world US $6 trillion a year by 2021, and the number of attacks has increased five-fold after COVID-19. Although there is substantial literature on the threats technological vulnerabilities have on the health care industry, less research exists on how pandemics like COVID-19 are opportunistic for ...
Christina Meilee Williams +2 more
openaire +4 more sources
Cybersecurity regulation: cybersecurity certification of operational technologies
The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification.
openaire +3 more sources
The gamification of cybersecurity training [PDF]
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie +7 more
core +2 more sources
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous and distributed systems, and it has increasingly become a ubiquitous computing service platform.
Xiang Li +5 more
doaj +1 more source

