Optimizing internet of things security through blockchain enabled software defined networking. [PDF]
Tumula S +8 more
europepmc +1 more source
UNAUTHORIZED ACCESS TO QUANTUM KEY DISTRIBUTION SYSTEM
openaire +1 more source
Retraction: Evaluation of 'Normal' Cognitive Functions and Correlation With MRI Volumetry: Towards a Definition of Vascular Cognitive Impairment. [PDF]
Sundar U +9 more
europepmc +1 more source
Retraction of: Advancing Question-Answering in Ophthalmology With Retrieval-Augmented Generation: Benchmarking Open-Source and Proprietary Large Language Models. [PDF]
europepmc +1 more source
Related searches:
Unauthorized access crime in Jordanian law (comparative study)
Digital Investigation, 2019Abstract This research cared about clarifying the legal provisions of the unauthorized access crime contained in article 3 of the Jordanian Cybercrime act of 2015 and comparing it to other Arabic legislations and French law as well as clarifying the position of international conventions on this crime. The analysis of the crime included clarifying its
Hamzeh abu issa +2 more
openaire +3 more sources
Unauthorized Access Monitoring in Optical Access Networks
2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO), 2020The article deals with the problem of protecting information from unauthorized access. The results of comparative analysis of methods for information extracting from optical fiber lines are presented. The classification of extraction methods, physical conditions for leak channels formation is given.
E. T. Kitova +2 more
openaire +1 more source
Authorized! access denied, unauthorized! access granted
Proceedings of the 6th International Conference on Security of Information and Networks, 2013Existing access control systems are mostly identity-based. However, such access control systems impose risks because recognized identity is not essentially an interpretation of good intentions of access. On the other hand, an un-identified individual might request access to suppress damage or prevent a catastrophic incident from happening.
Abdulaziz Almehmadi, Khalil El-Khatib
openaire +1 more source
Arbitrator2.0: Preventing Unauthorized Access on Passive Tags
IEEE Transactions on Mobile Computing, 2022As the Ultra High Frequency (UHF) passive Radio Frequency IDentification (RFID) technology becomes increasingly deployed, it faces an array of new security attacks. In this paper, we consider a type of attack in which a malicious RFID reader could arbitrarily access the tags, e.g., retrieve or modify IDs or other data in the memory, via standard ...
Han Ding +6 more
openaire +1 more source
Unauthorized Access Offences in Cyberworld
2015Computer hacking is the accessing of a computer system without the express or implied permission of the owner of that computer system (Bainbridge 2004, p. 381). A person who engages in this activity is known as a computer hacker and may simply be motivated by the mere thrill of being able to outwit the security systems contained in a computer.
Mohamed Chawki +3 more
openaire +1 more source
Preventing Unauthorized Access on Passive Tags
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, 2018As the Ultra High Frequency (UHF) passive Radio Frequency IDentification (RFID) technology becomes increasingly deployed, it faces an array of new security attacks. In this paper, we consider a type of attack in which a malicious RFID reader could arbitrarily modify the tags via standard commands, e.g., IDs or other data in the memory.
Han Ding +6 more
openaire +1 more source

