Results 21 to 30 of about 247,400 (347)
Building malware classificators usable by State security agencies
El sandboxing ha sido usado de manera regular para analizar muestras de software y determinar si estas contienen propiedades o comportamientos sospechosos.
David Esteban Useche-Peláez +3 more
doaj +1 more source
Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach
The usability/security trade-off indicates the inversely proportional relationship that seems to exist between usability and security. The more secure the systems, the less usable they will be. On the contrary, more usable systems will be less secure. So
Francesco Di Nocera, Giorgia Tempestini
doaj +1 more source
Doodle-Based Authentication Technique Using Augmented Reality
The emergence of augmented reality (AR) and virtual reality (VR) has revolutionized the trends in computing devices and modern technologies drastically.
Waqas Wazir +4 more
doaj +1 more source
Smart cyber-physical systems:beyond usable security to security ergonomics by design [PDF]
Securing cyber-physical systems is hard. They are complex infrastructures comprising multiple technological artefacts, designers, operators and users. Existing research has established the security challenges in such systems as well as the role of usable
Craggs, Barnaby, Rashid, Awais
core +1 more source
Distributed multimedia systems [PDF]
Multimedia systems will allow professionals worldwide to collaborate more effectively and to travel substantially less. But for multimedia systems to be effective, a good systems infrastructure is essential.
Mullender, Sape J.
core +2 more sources
PharmaChain: Blockchain-based drug supply chain provenance verification system
Over the last decade, pharmaceutical businesses have battled to standardize product traceability across the supply chain process, enabling counterfeiters to enter the market with counterfeit pharmaceuticals.
Sarmistha Sarna Gomasta +4 more
doaj +1 more source
A Lesson for the Future: Will You Let Me Violate Your Privacy to Save Your Life?
COVID-19 was an unprecedented pandemic that changed the lives of everyone. To handle the virus’s rapid spread, governments and big tech companies, such as Google and Apple, implemented Contact Tracing Applications (CTAs).
Khosro Salmani, Brian Atuh
doaj +1 more source
Given the increasingly severe security situation at home and abroad, the security of power system has received growing attention. Power monitoring system is one of the most important systems of power system.
XU Yanming +4 more
doaj +1 more source
Reducing Risky Security Behaviours: Utilising Affective Feedback to Educate Users
Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky ...
Lynsay A. Shepherd +2 more
doaj +1 more source
The current research efforts in the security domain are essentially inspired by the intention to ensure both healthcare software's security and usability. Practitioners are continuously working on techniques that can optimise security while affording the
Fahad Ahmed Al-Zahrani
doaj +1 more source

