Results 11 to 20 of about 2,352,522 (144)

On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats

open access: yesIEEE Access, 2020
Wireless networks constitute a significant attack vector for adversaries due to their wide usage in our everyday life. As the fifth generation of wireless networks reaches maturity, several vulnerabilities affecting earlier generations have been resolved.
Anna Angelogianni   +3 more
doaj   +1 more source

Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study

open access: yesIEEE Access, 2022
The integrated circuit (IC) ecosystem, today, is widely distributed. Usually, a handful of companies is involved in the development of a single chip – an environment that presents many opportunities for malicious activities such as the insertion ...
Felipe Almeida   +3 more
doaj   +1 more source

IoT Security Mechanisms in the Example of BLE

open access: yesComputers, 2021
In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure,
Evgeny Kalinin   +3 more
doaj   +1 more source

Digital Authorship Attribution in Russian-Language Fanfiction and Classical Literature

open access: yesAlgorithms, 2022
This article is the third paper in a series aimed at the establishment of the authorship of Russian-language texts. This paper considers methods for determining the authorship of classical Russian literary texts, as well as fanfiction texts.
Anastasia Fedotova   +3 more
doaj   +1 more source

Determining the Age of the Author of the Text Based on Deep Neural Network Models

open access: yesInformation, 2020
This paper is devoted to solving the problem of determining the age of the author of the text based on models of deep neural networks. The article presents an analysis of methods for determining the age of the author of a text and approaches to ...
Aleksandr Sergeevich Romanov   +4 more
doaj   +1 more source

Authorship Identification of Binary and Disassembled Codes Using NLP Methods

open access: yesInformation, 2023
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors.
Aleksandr Romanov   +3 more
doaj   +1 more source

Security of Biometric Systems

open access: yesProcedia Engineering, 2015
AbstractThere are many ways how to identify people and to provide their authorization of access to a specific area. This article describes the reliability of biometric systems that are commonly used to identify of people. The article aims to highlight the ways in which to disturb the security of biometric systems.
Adámek, Milan   +2 more
openaire   +2 more sources

Authorship Attribution of Social Media and Literary Russian-Language Texts Using Machine Learning Methods and Feature Selection

open access: yesFuture Internet, 2021
Authorship attribution is one of the important fields of natural language processing (NLP). Its popularity is due to the relevance of implementing solutions for information security, as well as copyright protection, various linguistic studies, in ...
Anastasia Fedotova   +3 more
doaj   +1 more source

Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network

open access: yesFuture Internet, 2022
This paper is a continuation of our previous work on solving source code authorship identification problems. The analysis of heterogeneous source code is a relevant issue for copyright protection in commercial software development. This is related to the
Anna Kurtukova   +3 more
doaj   +1 more source

Security Assessment of Systems of Systems

open access: yes2019 IEEE/ACM 7th International Workshop on Software Engineering for Systems-of-Systems (SESoS) and 13th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems (WDES), 2019
Engineering Systems of Systems is one of the new chal-lenges of the last few years. This depends on the increasing number of systems that must interact one with another to achieve a goal. One peculiarity of Systems of Systems is that they are made of systems able to live on their own with well-established functionalities and requirements, and that are ...
Olivero MA   +4 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy