Results 241 to 250 of about 305,823 (288)
Some of the next articles are maybe not open access.
Robust Detection of Unauthorized Wireless Access Points
Mobile Networks and Applications, 2008Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection
Bo Yan +3 more
openaire +1 more source
Stop Unauthorized Access to Your Smart Devices
2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), 2018Smart devices (e.g., smartphones or tablets) have become an indispensable part of our daily lives for conducting mobile payment transactions, and storing both corporate and personal sensitive data. As a result, unauthorized access to smart devices can result in a catastrophic security breach.
Yutong Liu +5 more
openaire +1 more source
Unauthorized access identification in restricted areas
1998The paper escribes a system to control vehicle accesses in restricted areas. The signalling of vehicles whose license-plates do not belong to a specific database is the aim of the system. The adaptation to different environmental conditions, and the identification of a vehicle by processing the license-plate pattern as a whole, without considering the ...
Tascini, G, Carbonaro, A, Zingaretti, P
openaire +1 more source
Examining the antecedents of employee unauthorized computer access
Journal of Statistics and Management Systems, 2018AbstractUnauthorized computer access by employees is the most common hacking behavior in every company. Hence, it is necessary to first understand why an employee engages to commit it and then find effective methods of prevention to reduce the crime rate.
Tung-Ching Lin +3 more
openaire +1 more source
UNAUTHORIZED ACCESS DETECTION SYSTEM
International Scientific Journal of Engineering and ManagementABSTRACT- In an era where personal and organizational data security is paramount, traditional authentication mechanisms such as username and password are no longer sufficient to prevent unauthorized access. This project presents a Flask-based real-time facial recognition system integrated with OTP (One-Time Password) verification and email alert ...
openaire +1 more source
BIOMETRIC METHODS SECURE COMPUTER DATA FROM UNAUTHORIZED ACCESS
2023Biometric methods play a vital role in securing computer data from unauthorized access. With the increasing reliance on digital technology, ensuring the privacy and integrity of sensitive information has become a paramount concern. Traditional methods of authentication, such as passwords and PINs, are susceptible to theft, loss, or hacking.
Mirzakarimov, Baxtiyor, Xayitov, Azizjon
openaire +1 more source
Using unauthorized access to information based on applets
2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2018The problem of unauthorized access to information on Web sites through the use of malicious code by an attacker leads to undesirable consequences that arise both on the server side and on the users side. This article is devoted to the review and analysis of existing methods for ensuring the information security of automated systems for authentication ...
Sergey S. Sokolov +4 more
openaire +1 more source
Monitoring unauthorized internet accesses through a ‘honeypot’ system
International Journal of Communication Systems, 2010AbstractThe role of the Internet is continuously increasing and many technical, commercial, and business transactions are carried out by a multitude of users who exploit a set of specialized/sophisticated network applications. In this context, the task of network monitoring and surveillance is gaining great relevance and honeypots represent promising ...
MARCHESE, MARIO +2 more
openaire +2 more sources
Wardriving: Unauthorized Access to Wi-Fi Networks
Information Systems Security, 2006Abstract Wireless local area network, or Wi-Fi (“wireless fidelity”), is a short-range networking technology. Wi-Fi allows suitably equipped computers to connect to computer networks and the Internet using a radio connection rather than wires. Most new laptop computers can access Wi-Fi routers.
openaire +1 more source
FaceTrack: Monitoring Unauthorized System Access
FaceTrack is a real-time facial recognition tool designed to verify the identity of users at the time of device login. Unlike standard password-based systems, it confirms whether the individual accessing the system is authorized. If an unfamiliar face is detected, the application captures an image and promptly notifies the rightful user through ...openaire +1 more source

