Results 31 to 40 of about 801,622 (296)

An approximate dynamic programming approach to food security of communities following hazards [PDF]

open access: yes, 2018
Food security can be threatened by extreme natural hazard events for households of all social classes within a community. To address food security issues following a natural disaster, the recovery of several elements of the built environment within a ...
Chong, Edwin K. P.   +4 more
core   +2 more sources

Social engineering as a component of professional competence in information security of future computer science teachers

open access: yesОсвітній вимір
The article considers the actual problem of information security - social engineering. The authors investigate what social engineering is and its main methods, including phishing, vishing, baiting, and pretexting, and analyze the educational programs of
Bohdan M. Oliinyk, Vasyl P. Oleksiuk
doaj   +1 more source

An Intelligent Penetration Test Simulation Environment Construction Method Incorporating Social Engineering Factors

open access: yesApplied Sciences, 2022
The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research ...
Yang Li   +4 more
doaj   +1 more source

Security Aware Virtual Base Station Placement in 5G Cloud Radio Access Networks [PDF]

open access: yes, 2018
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. In fifth generation (5G) cloud radio access networks (C-RAN), baseband processing of base stations (BS’s) will be processed on virtual machines called ...
Hu, YF   +3 more
core   +1 more source

Analisa Penyerangan untuk Cyber Security Social Engineering

open access: yesJurnal Informatika Universitas Pamulang, 2023
In the increasingly advanced digital era, threats to cyber security are increasing. One frequently used attack technique is social engineering, which involves psychological and social manipulation of individuals to gain confidential information or access to computer sistems. To counter this threat, there needs to be an effective solution.
openaire   +1 more source

Review OSINT tool for social engineering

open access: yesFrontiers in Big Data, 2023
In recent years, we observed an increase in cyber threats, especially social engineering attacks. By social engineering, we mean a set of techniques and tools to collect information about a person or target to extort sensitive information.
Martina Nobili
doaj   +1 more source

ANALYSIS OF USERS’ PROTECTION FROM SOCIO-ENGINEERING ATTACKS: SOCIAL GRAPH CREATION BASED ON INFORMATION FROM SOCIAL NETWORK WEBSITES [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2018
Subject of Research. The paper deals with accounts in social network websites as a source of information about the intensity of communication between employees in the team.
M. V. Abramov   +2 more
doaj   +1 more source

Layered Analysis of Security Ceremonies [PDF]

open access: yes, 2012
A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks.
Bella, Giampaolo, Coles-Kemp, Lizzie
core   +3 more sources

Vulnerability to social engineering in social networks : a proposed user-centric framework [PDF]

open access: yes, 2016
Social networking sites have billions of users who communicate and share their personal information every day. Social engineering is considered one of the biggest threats to information security nowadays.
Albladi, Samar, Weir, George R S
core   +1 more source

Dammarenediol II enhances etoposide‐induced apoptosis by targeting O‐GlcNAc transferase and Akt/GSK3β/mTOR signaling in liver cancer

open access: yesMolecular Oncology, EarlyView.
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy