Results 21 to 30 of about 247,400 (347)

Building malware classificators usable by State security agencies

open access: yesIteckne, 2018
El sandboxing ha sido usado de manera regular para analizar muestras de software y determinar si estas contienen propiedades o comportamientos sospechosos.
David Esteban Useche-Peláez   +3 more
doaj   +1 more source

Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach

open access: yesJournal of Cybersecurity and Privacy, 2022
The usability/security trade-off indicates the inversely proportional relationship that seems to exist between usability and security. The more secure the systems, the less usable they will be. On the contrary, more usable systems will be less secure. So
Francesco Di Nocera, Giorgia Tempestini
doaj   +1 more source

Doodle-Based Authentication Technique Using Augmented Reality

open access: yesIEEE Access, 2020
The emergence of augmented reality (AR) and virtual reality (VR) has revolutionized the trends in computing devices and modern technologies drastically.
Waqas Wazir   +4 more
doaj   +1 more source

Smart cyber-physical systems:beyond usable security to security ergonomics by design [PDF]

open access: yes, 2017
Securing cyber-physical systems is hard. They are complex infrastructures comprising multiple technological artefacts, designers, operators and users. Existing research has established the security challenges in such systems as well as the role of usable
Craggs, Barnaby, Rashid, Awais
core   +1 more source

Distributed multimedia systems [PDF]

open access: yes, 1992
Multimedia systems will allow professionals worldwide to collaborate more effectively and to travel substantially less. But for multimedia systems to be effective, a good systems infrastructure is essential.
Mullender, Sape J.
core   +2 more sources

PharmaChain: Blockchain-based drug supply chain provenance verification system

open access: yesHeliyon, 2023
Over the last decade, pharmaceutical businesses have battled to standardize product traceability across the supply chain process, enabling counterfeiters to enter the market with counterfeit pharmaceuticals.
Sarmistha Sarna Gomasta   +4 more
doaj   +1 more source

A Lesson for the Future: Will You Let Me Violate Your Privacy to Save Your Life?

open access: yesJournal of Cybersecurity and Privacy, 2023
COVID-19 was an unprecedented pandemic that changed the lives of everyone. To handle the virus’s rapid spread, governments and big tech companies, such as Google and Apple, implemented Contact Tracing Applications (CTAs).
Khosro Salmani, Brian Atuh
doaj   +1 more source

Security protection technology of power monitoring system based on autonomous and controllable operating system platform

open access: yesZhejiang dianli, 2022
Given the increasingly severe security situation at home and abroad, the security of power system has received growing attention. Power monitoring system is one of the most important systems of power system.
XU Yanming   +4 more
doaj   +1 more source

Reducing Risky Security Behaviours: Utilising Affective Feedback to Educate Users

open access: yesFuture Internet, 2014
Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky ...
Lynsay A. Shepherd   +2 more
doaj   +1 more source

Evaluating the Usable-Security of Healthcare Software Through Unified Technique of Fuzzy Logic, ANP and TOPSIS

open access: yesIEEE Access, 2020
The current research efforts in the security domain are essentially inspired by the intention to ensure both healthcare software's security and usability. Practitioners are continuously working on techniques that can optimise security while affording the
Fahad Ahmed Al-Zahrani
doaj   +1 more source

Home - About - Disclaimer - Privacy