Results 11 to 20 of about 2,352,522 (144)
On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats
Wireless networks constitute a significant attack vector for adversaries due to their wide usage in our everyday life. As the fifth generation of wireless networks reaches maturity, several vulnerabilities affecting earlier generations have been resolved.
Anna Angelogianni +3 more
doaj +1 more source
Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study
The integrated circuit (IC) ecosystem, today, is widely distributed. Usually, a handful of companies is involved in the development of a single chip – an environment that presents many opportunities for malicious activities such as the insertion ...
Felipe Almeida +3 more
doaj +1 more source
IoT Security Mechanisms in the Example of BLE
In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure,
Evgeny Kalinin +3 more
doaj +1 more source
Digital Authorship Attribution in Russian-Language Fanfiction and Classical Literature
This article is the third paper in a series aimed at the establishment of the authorship of Russian-language texts. This paper considers methods for determining the authorship of classical Russian literary texts, as well as fanfiction texts.
Anastasia Fedotova +3 more
doaj +1 more source
Determining the Age of the Author of the Text Based on Deep Neural Network Models
This paper is devoted to solving the problem of determining the age of the author of the text based on models of deep neural networks. The article presents an analysis of methods for determining the age of the author of a text and approaches to ...
Aleksandr Sergeevich Romanov +4 more
doaj +1 more source
Authorship Identification of Binary and Disassembled Codes Using NLP Methods
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors.
Aleksandr Romanov +3 more
doaj +1 more source
AbstractThere are many ways how to identify people and to provide their authorization of access to a specific area. This article describes the reliability of biometric systems that are commonly used to identify of people. The article aims to highlight the ways in which to disturb the security of biometric systems.
Adámek, Milan +2 more
openaire +2 more sources
Authorship attribution is one of the important fields of natural language processing (NLP). Its popularity is due to the relevance of implementing solutions for information security, as well as copyright protection, various linguistic studies, in ...
Anastasia Fedotova +3 more
doaj +1 more source
Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network
This paper is a continuation of our previous work on solving source code authorship identification problems. The analysis of heterogeneous source code is a relevant issue for copyright protection in commercial software development. This is related to the
Anna Kurtukova +3 more
doaj +1 more source
Security Assessment of Systems of Systems
Engineering Systems of Systems is one of the new chal-lenges of the last few years. This depends on the increasing number of systems that must interact one with another to achieve a goal. One peculiarity of Systems of Systems is that they are made of systems able to live on their own with well-established functionalities and requirements, and that are ...
Olivero MA +4 more
openaire +4 more sources

