Results 51 to 60 of about 164,979 (324)

Cybersecurity dynamics

open access: yesProceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
2 ...
openaire   +3 more sources

A Literature Survey on Potential Private User Information Leakage in Metaverse Applications

open access: yesAdvanced Intelligent Systems, EarlyView.
This survey explores potential privacy risks in the Metaverse, focusing on personal data inferred from virtual reality headsets embedded with passive brain‐computer interfaces (BCI). It reviews how age, gender, and ethnicity can be predicted using neurophysiological signals, (e.g., electroencephalogram). The survey also explores future threats from non‐
Mina Jaberi, Tiago H. Falk
wiley   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Using Homomorphic Proxy Re-Encryption to Enhance Security and Privacy of Federated Learning-Based Intelligent Connected Vehicles

open access: yesIET Information Security
Intelligent connected vehicles (ICVs) are one of the fast-growing directions that plays a significant role in the area of autonomous driving. To realize collaborative computation among ICVs, federated learning (FL) or federated-based large language model
Yang Bai   +7 more
doaj   +1 more source

Metamorphic Testing for Cybersecurity [PDF]

open access: yesComputer, 2016
Testing is a major approach for the detection of software defects, including vulnerabilities in security features. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct negative testing as well as to alleviate the oracle problem in the testing of security ...
Chen, Tsong Yueh   +6 more
openaire   +5 more sources

The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security [PDF]

open access: yes, 2016
[Excerpt] This report examines congressional oversight of two strategies undertaken by Congress and the executive branch to strengthen the federal cybersecurity workforce: (1) initiatives to define and identify the federal cybersecurity workforce, and (2)
Francis, Kathryn A, Ginsberg, Wendy
core   +2 more sources

Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness

open access: yesAdvanced Intelligent Systems, EarlyView.
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley   +1 more source

Domain knowledge free cloud-IDS with lightweight embedding method

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
The expansion of the cloud computing market has provided a breakthrough in efficiently storing and managing data for individuals and companies. As personal and corporate data move to the cloud, diverse attacks targeting the cloud have also increased for ...
Yongsik Kim, Gunho Park, Huy Kang Kim
doaj   +1 more source

Hardware Trojans detection through automatic properties extraction and formal verification

open access: yesXibei Gongye Daxue Xuebao
To address the difficulties in obtaining golden reference models and the low accuracy when conducting pre-silicon hardware Trojans detection on a large-scale integrated circuit design, a formal detection method to quickly and accurately locate hardware ...
DAI Xiaojie   +3 more
doaj   +1 more source

The issues caused by misinformation—How workers and organizations deal with it: A systematic literature review

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract In today's digital age, misinformation propagates rapidly through digital channels, blurring the lines between truth and fiction, and challenging the foundations of trust in information sources. Although affecting all spheres of life, misinformation poses a significant threat to workers highlighting a critical intersection between ...
Ashwani Malhotra   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy