Results 21 to 30 of about 3,289,244 (344)

Research on tor-based anonymous DDoS attack [PDF]

open access: yesMATEC Web of Conferences, 2021
Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this attack is very difficult to trace due to the strong anonymity of Tor. Through conducting experiments in different network environment and making analyzation of security, the ...
Wang Rui   +4 more
doaj   +1 more source

"NO" SECURITY OF INFORMATION TECHNOLOGY [PDF]

open access: yesModern Management Review, 2020
Using the Internet is inseparably connected with building the awareness of its users, hence the  tasks that arise for a modern man in relation to information technologies, especially in terms  of online threats. Children are particularly vulnerable.
openaire   +3 more sources

N-Trans: Parallel Detection Algorithm for DGA Domain Names

open access: yesFuture Internet, 2022
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang   +4 more
doaj   +1 more source

Hate Speech Detection Using Machine Learning: A Survey

open access: yesAcademy Journal of Science and Engineering, 2023
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,   +7 more
doaj  

Voice Deepfake Detection Using the Self-Supervised Pre-Training Model HuBERT

open access: yesApplied Sciences, 2023
In recent years, voice deepfake technology has developed rapidly, but current detection methods have the problems of insufficient detection generalization and insufficient feature extraction for unknown attacks.
Lanting Li   +4 more
doaj   +1 more source

Mathematical approximator based on basic spline approximation [PDF]

open access: yesE3S Web of Conferences
The article considers the problem of constructing a mathematical piecewise linear approximator based on approximation by basis splines. An algorithm has been developed designed to implement a class of special functions and create parallel ...
Turdimatov Mamirjon   +5 more
doaj   +1 more source

A Data Enhancement Algorithm for DDoS Attacks Using IoT

open access: yesSensors, 2023
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv   +4 more
doaj   +1 more source

Paradoxes in Information Security

open access: yesIEEE Potentials, 2016
In this article, we approach information security from a novel perspective as we examine its unintended ramifications and its paradoxes. Information security and cybersecurity are necessities of modern societies. Simply put, services that are based on information and communication technologies would not function without information security.
Jukka Vuorinen, Pekka Tetri
openaire   +3 more sources

THE GENERATING RANDOM SEQUENCES WITH THE INCREASED CRYPTOGRAPHIC STRENGTH

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2020
Random sequences are used in various applications in construction of cryptographic systems or formations of noise-type signals. For these tasks there is used the program generator of random sequences which is the determined device. Such a generator, as a
Volodymyr Korchynskyi   +3 more
doaj   +1 more source

Security and Information

open access: yes, 2020
With the argument that society needs to have certain products and / or services, the constituted powers create public bodies that are properly structured to act in a certain line of activity, such as education, security, health, social welfare, etc. In this way, they provide products and / or services directly to the population, who pay for them by ...
openaire   +1 more source

Home - About - Disclaimer - Privacy