Results 41 to 50 of about 8,033 (189)

Developing a Secure Cyberphysical System for Altitude Chambers

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre   +4 more
wiley   +1 more source

Impact assessment for vulnerabilities in open-source software libraries

open access: yes, 2015
Software applications integrate more and more open-source software (OSS) to benefit from code reuse. As a drawback, each vulnerability discovered in bundled OSS potentially affects the application.
Plate, Henrik   +2 more
core   +1 more source

From rights to runtime: Privacy engineering for agentic AI

open access: yesAI Magazine, Volume 46, Issue 4, Winter 2025.
Abstract Agentic AI shifts stacks from request‐response to plan‐execute. Systems no longer just answer; they act—planning tasks, calling tools, keeping memory, and changing external state. That shift moves privacy from policy docs into the runtime.
Keivan Navaie
wiley   +1 more source

Security and Privacy Issues of Big Data [PDF]

open access: yes, 2015
This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy.
Moura, Jose, Serrao, Carlos
core   +2 more sources

Survey on AI Ethics: A Socio‐Technical Perspective

open access: yesComputational Intelligence, Volume 41, Issue 6, December 2025.
Abstract The past decade has observed a significant advancement in AI, with deep learning‐based models being deployed in diverse scenarios, including safety‐critical applications. As these AI systems become deeply embedded in our societal infrastructure, the repercussions of their decisions and actions have significant consequences, making the ethical ...
Dave Mbiazi   +5 more
wiley   +1 more source

Strengthening critical educational infrastructures: a Red Team approach and advanced vulnerability assessment methodologies

open access: yesRevista Colombiana de Tecnologías de Avanzada
This article delves into strengthening security in critical educational infrastructures using a Red Team approach for thorough vulnerability assessments.
Isabel del Socorro Escobar Martínez   +2 more
doaj   +1 more source

Penerapan Pengujian Keamanan Web Server Menggunakan Metode OWASP versi 4 (Studi Kasus Web Server Ujian Online)

open access: yesMultitek Indonesia, 2016
Fakultas Teknik Universitas Muhammadiyah Ponorogo telah menerapkan Ujian Tengah Semester dan Ujian Akhir Semester menggunakan aplikasi Si Ujo (Sistem Ujian Online) berbasis web.
Mohammad Muhsin, Adi Fajaryanto
doaj   +1 more source

Investigating the tension between cloud-related actors and individual privacy rights [PDF]

open access: yes, 2019
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob   +2 more
core  

Towards Multi‐Class Socio‐Technical Congruence: Assessing Coordination in Collaborative Software Development Settings

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 9, September 2025.
We introduce multi‐class socio‐technical congruence (MC‐STC), an extension of the widely studied socio‐technical congruence framework, to enable the assessment of coordination between contributors with different functional alignments or roles (e.g., development and security).
Roshan Namal Rajapakse, Claudia Szabo
wiley   +1 more source

Website Security Analysis Using Vulnerability Assessment Method

open access: yesJournal of Innovation Information Technology and Application
In today’s digital era, ensuring website security is crucial, especially in the education sector which is frequently targeted by cyber attacks. This  research aims to test security of the Universitas Internasional Batam (UIB) website using OWASP ZAP and ...
Haeruddin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy