Results 21 to 30 of about 2,010,621 (347)

Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective

open access: yesIEEE Access, 2021
This paper proposes a safe copy-back program operation in a NAND flash memory, which is targeting digital forensics for a variety of reasons. Due to the background management operation of the NAND flash memory, the original data is highly likely to ...
Na Young Ahn, Dong Hoon Lee
doaj   +1 more source

Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator

open access: yesSensors, 2021
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or ...
Kyoungmin Kim   +3 more
doaj   +1 more source

Group privacy management strategies and challenges in Facebook : a focus group study among Flemish youth organizations [PDF]

open access: yes, 2016
A large body of research has studied young people’s privacy practices and needs in Facebook. Less is known about group privacy. In this study 12 focus groups were organized with a total of 78 adolescents and young adults of local Flemish youth ...
De Wolf, Ralf
core   +3 more sources

Assessment of verbal interaction in Chinese classroom using social network analysis [PDF]

open access: yesPeerJ Computer Science
Background The global growth in Chinese language learners presents systematic challenges to Chinese classroom interaction evaluation. Key limitations include inadequate accuracy in speech recognition and shallow interaction analysis.
Li Zhang   +5 more
doaj   +2 more sources

An Examination of Privacy Policies of US Government Senate Websites. [PDF]

open access: yes, 2010
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core   +2 more sources

Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks

open access: yesIEEE Access, 2022
As an indispensable part of intelligent transportation system, a traffic-sensitive navigation system can assist drivers in avoiding traffic congestion by providing navigation services.
Yingying Yao   +4 more
doaj   +1 more source

Numerical Evaluation of Job Finish Time Under MTD Environment

open access: yesIEEE Access, 2020
Moving target defense (MTD) has recently emerged as a game-changer in the confrontation between cyberattack and defense. MTD mechanism constantly and randomly changes the system configurations to create uncertainty of the attack surface against cyber ...
Zhi Chen   +3 more
doaj   +1 more source

Integral Cryptanalysis of Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim   +5 more
doaj   +1 more source

Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things

open access: yesIEEE Access, 2017
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure key storage is expensive, novel solutions have been developed based on the idea of deriving the key from noisy ...
Christopher Huth   +4 more
doaj   +1 more source

On ADS-B Sensor Placement for Secure Wide-Area Multilateration

open access: yesProceedings, 2020
As automatic dependent surveillance–broadcast (ADS-B) becomes more prevalent, the placement of on-ground sensors is vital for Air Traffic Control (ATC) to control the airspace.
Ala’ Darabseh   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy