Results 81 to 90 of about 27,296 (205)

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

open access: yes, 2017
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer   +7 more
core   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

Your employees: the front line in cyber security [PDF]

open access: yes, 2016
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core  

One Step Forward, Two Steps Back: Managing Uncertainties in Outcomes, Deliverables, and Means in Behavioral Intervention Development Projects

open access: yesJournal of Operations Management, Volume 72, Issue 1, Page 81-107, January 2026.
ABSTRACT We take an extended perspective on project success that includes post‐project outcomes as well as at‐end and during‐project success. To manage projects accordingly, we conceptualize three corresponding orders of uncertainty (outcomes, deliverables, and means uncertainties).
Philip Cash   +2 more
wiley   +1 more source

A socio-cognitive and computational model for decision making and user modelling in social phishing [PDF]

open access: yes
Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past.
Berki , Eleni   +4 more
core  

A secure email login system using virtual password [PDF]

open access: yes, 2011
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual password system.
Doshi, Nishant, Tanti, Bhavin
core   +1 more source

Secure Authentication via Quantum Physical Unclonable Functions: A Review

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 1, January 2026.
This in‐depth review article examines the origins, development, and evolution of Quantum Physical Unclonable Functions (QPUFs), with a particular focus on their use in secure authentication. The topic is motivated and introduced in detail, addressing both theoretical foundations and practical implementations, and is supported by a systematic article ...
Pol Julià Farré   +8 more
wiley   +1 more source

Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

open access: yesIEEE Open Journal of the Communications Society
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad   +6 more
doaj   +1 more source

Research on the Credulity of Spear-Phishing Attacks for Lithuanian Education Institutions’ Employees

open access: yesApplied Sciences
Organizational security assurance is a complex and multi-dimensional task. One of the biggest threats to an organization is the credulity of phishing attacks for its employees.
Justinas Rastenis   +4 more
doaj   +1 more source

An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents

open access: yesIEEE Access, 2019
Phishing attacks have been persistent for more than two decades despite mitigation efforts from academia and industry. We believe that users fall victim to attacks not only because of lack of knowledge and awareness, but also because they are not ...
Jema David Ndibwile   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy