Results 21 to 30 of about 306,057 (287)

Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

open access: yesSensors, 2017
Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in
Abdul Majeed   +2 more
doaj   +1 more source

SENinja: A symbolic execution plugin for Binary Ninja

open access: yesSoftwareX, 2022
Symbolic execution is a program analysis technique that aims to automatically identify interesting inputs for an application, using them to generate program executions covering different parts of the code.
Luca Borzacchiello   +2 more
doaj   +1 more source

Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks

open access: yesSensors, 2023
In smart home environments, the interaction between a remote user and devices commonly occurs through a gateway, necessitating the need for robust user authentication. Despite numerous state-of-the-art user-authentication schemes proposed over the years,
Iqra Asghar   +5 more
doaj   +1 more source

Vulnerable Road Users or Vulnerable Transport Planning?

open access: yesFrontiers in Sustainable Cities, 2020
The concept of vulnerable road users is widely used in transport and road safety discourse. The concept refers to walkers or pedestrians and cyclists (bicyclists and motorcylists) who are easily injured and killed in a car-dominated road space. Who is really vulnerable: road users or transport planning?
openaire   +2 more sources

Vulnerability Analysis of MMS User Agents [PDF]

open access: yes2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users through a multi-step process, whose end-points are the MMS User Agents that reside on the users? mobile phones. The security of these components is critical, be- cause they might
Collin Mulliner, Giovanni Vigna
openaire   +1 more source

Adversarial attacks and defenses in physiological computing: a systematic review

open access: yesNational Science Open, 2022
Physiological computing uses human physiological data as system inputs in real time. It includes, or significantly overlaps with, brain-computer interfaces, affective computing, adaptive automation, health informatics, and physiological signal based ...
Wu Dongrui   +7 more
doaj   +1 more source

Moral Vulnerability and the Task of Reparations [PDF]

open access: yes, 2014
This essay seeks to understand the domain and demands of reparative justice in terms of moral vulnerability. Significant harms raise the question of whether victims stand in truly reciprocal practices of accountability; if they do, they enjoy the power ...
Walker, Margaret Urban
core   +2 more sources

Analysis of Urban Sprawl Effects on Social Vulnerability (Case Study: Qazvin City Districts) [PDF]

open access: yesتوسعه پایدار شهری, 2021
Iran is an earthquake-prone country that many cities have experienced the earthquake. Magnitude of earthquake damage not only depends on physical destructions, but also one of the major dimensions of earthquake hazards is social vulnerability.In this ...
Esfandyar Zebardast, Hossein Ghanooni
doaj  

Social Engineering Attacks Prevention: A Systematic Literature Review

open access: yesIEEE Access, 2022
Social engineering is an attack on information security for accessing systems or networks. Social engineering attacks occur when victims do not recognize methods, models, and frameworks to prevent them.
Wenni Syafitri   +4 more
doaj   +1 more source

Escrow: A large-scale web vulnerability assessment tool [PDF]

open access: yes, 2014
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core   +2 more sources

Home - About - Disclaimer - Privacy