Results 31 to 40 of about 6,814 (243)
ZaligVinder: A generic test framework for string solvers
The increased interest in string solving in the recent years has made it very hard to identify the right tool to address a particular user's purpose. Generally, it lacks of comparisons between the existing tools on an equal set of benchmarks, especially as a common framework to compare solvers seems to be missing.
Mitja Kulczynski+3 more
wiley +1 more source
Pada era digital sekarang hampir semua orang mengakses internet, Website merupakan salah satu situs yang ada di internet yang dapat menyimpan dan menyebarkan segala informasi.
Gede Angga Septiawan+3 more
doaj +1 more source
Smart grid security: Attacks and defence techniques
This study investigates cyber security threats in the smart grid and countermeasures against them and suggests future research direction for improved smart grid security. Abstract The smart grid (SG) consists of three main components, that is, Information Technology (IT), Operational Technology (OT), and Advanced Metring Infrastructure (AMI).
Yoonjib Kim, Saqib Hakak, Ali Ghorbani
wiley +1 more source
A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications.
Jahanzeb Shahid+5 more
doaj +1 more source
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐from‐home possibilities permits flexibility for organizations and persons. At the same time, it makes it more difficult to secure the IT infrastructure as the IT team needs to keep track of who is accessing what data from where and when on which device.
Daniela Pöhn+2 more
wiley +1 more source
In this article, we have carried out a case study to optimize the classification of the maliciousness of cybersecurity events by IP addresses using machine learning techniques. The optimization is studied focusing on time complexity. Firstly, we have used the extreme gradient boosting model, and secondly, we have parallelized the machine learning ...
M. V. Carriegos+3 more
wiley +1 more source
Web applications have been a significant target for successful security breaches in the last few years. They are currently secured, as a primary method, by searching for their vulnerabilities with specialized tools referred to as Web Application ...
Suliman Alazmi, Daniel Conte De Leon
doaj +1 more source
BlackWatch:increasing attack awareness within web applications [PDF]
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents.
Coull, Natalie+2 more
core +2 more sources
Automatic generation of threat paths in internet of things‐based systems
Abstract Today, ‘security challenge’ is considered a commonly‐used catchword when it comes to emerging technologies such as the internet of things (IoT). Turning a blind eye to this challenge can sometimes lead to irreparable human and financial damage in everyday life.
Mohammad Ali Ramazanzadeh+2 more
wiley +1 more source
WAF ЗАХИСТУ ВНУТРІШНІХ СЕРВІСІВ У СТРУКТУРІ ZERO TRUST
Сучасний світ висуває високі вимоги до IT-інфраструктури та комп’ютерних мереж підприємств, що обумовлює складність їх структур. Чим складніша структура і кількість ланок, що входять до неї, тим вища імовірність появи вразливих місць.
Valerii Lakhno+5 more
doaj +1 more source