Results 21 to 30 of about 306,057 (287)
Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in
Abdul Majeed +2 more
doaj +1 more source
SENinja: A symbolic execution plugin for Binary Ninja
Symbolic execution is a program analysis technique that aims to automatically identify interesting inputs for an application, using them to generate program executions covering different parts of the code.
Luca Borzacchiello +2 more
doaj +1 more source
In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years,
Iqra Asghar +5 more
doaj +1 more source
Vulnerable Road Users or Vulnerable Transport Planning?
The concept of vulnerable road users is widely used in transport and road safety discourse. The concept refers to walkers or pedestrians and cyclists (bicyclists and motorcylists) who are easily injured and killed in a car-dominated road space. Who is really vulnerable: road users or transport planning?
openaire +2 more sources
Vulnerability Analysis of MMS User Agents [PDF]
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users through a multi-step process, whose end-points are the MMS User Agents that reside on the users? mobile phones. The security of these components is critical, be- cause they might
Collin Mulliner, Giovanni Vigna
openaire +1 more source
Adversarial attacks and defenses in physiological computing: a systematic review
Physiological computing uses human physiological data as system inputs in real time. It includes, or significantly overlaps with, brain-computer interfaces, affective computing, adaptive automation, health informatics, and physiological signal based ...
Wu Dongrui +7 more
doaj +1 more source
Moral Vulnerability and the Task of Reparations [PDF]
This essay seeks to understand the domain and demands of reparative justice in terms of moral vulnerability. Significant harms raise the question of whether victims stand in truly reciprocal practices of accountability; if they do, they enjoy the power ...
Walker, Margaret Urban
core +2 more sources
Analysis of Urban Sprawl Effects on Social Vulnerability (Case Study: Qazvin City Districts) [PDF]
Iran is an earthquake-prone country that many cities have experienced the earthquake. Magnitude of earthquake damage not only depends on physical destructions, but also one of the major dimensions of earthquake hazards is social vulnerability.In this ...
Esfandyar Zebardast, Hossein Ghanooni
doaj
Social Engineering Attacks Prevention: A Systematic Literature Review
Social engineering is an attack on information security for accessing systems or networks. Social engineering attacks occur when victims do not recognize methods, models, and frameworks to prevent them.
Wenni Syafitri +4 more
doaj +1 more source
Escrow: A large-scale web vulnerability assessment tool [PDF]
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core +2 more sources

