Results 21 to 30 of about 470,699 (271)

An Empirical Study on Android-related Vulnerabilities

open access: yes, 2017
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and keys. Basically, they embed most of our private information in our pocket.
Bavota, Gabriele   +2 more
core   +1 more source

Classification of logical vulnerability based on group attacking method [PDF]

open access: yes, 2020
New advancement in the field of e-commerce software technology has also brought many benefits, at the same time developing process always face different sort of problems from design phase to implement phase.
Nabi, Faisal   +2 more
core   +2 more sources

Threat Modeling—How to Visualize Attacks on IOTA?

open access: yesSensors, 2021
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased ...
Ikram Ullah   +3 more
doaj   +1 more source

TOWARDS GREEN RESILIENT CITIES IN EASTERN EUROPEAN UNION COUNTRIES [PDF]

open access: yesJournal of Urban and Regional Analysis, 2020
Investing in green facilities is a process of urban renewal that can transform cities by enhancing the quality of life, strengthening the local economy and reducing environmental impact.
Alexandru BĂNICĂ   +2 more
doaj   +1 more source

Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response

open access: yes, 2017
Considerable delays often exist between the discovery of a vulnerability and the issue of a patch. One way to mitigate this window of vulnerability is to use a configuration workaround, which prevents the vulnerable code from being executed at the cost ...
D'Angelo, Mariana   +3 more
core   +1 more source

Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone

open access: yesSensors, 2021
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices.
Nikolaos Koutroumpouchos   +2 more
doaj   +1 more source

A qualitative study on the unresolved problem of female genital mutilations, socio-cultural reasons, and policy issues in the Afar regions of Ethiopia

open access: yesCogent Public Health, 2023
: Female genital mutilation is one harmful traditional practice that is highly prevalent in African countries such as Guinea, Sierra Leone, the Gambia, Mauritania, Mali, and Burkina Faso, as well as in Sudan, Egypt, and Ethiopia.
Habtamu Wondimu   +2 more
doaj   +1 more source

Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies

open access: yesSensors, 2023
Industrial Control Systems (ICS), which include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers (PLC), play a crucial role in managing and regulating industrial processes ...
Mary Nankya, Robin Chataut, Robert Akl
doaj   +1 more source

Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data

open access: yes, 2017
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and
Edkrantz M.   +4 more
core   +1 more source

Reducing uncertainties of climate projections on solar energy resources in Brazil

open access: yesScientific Reports
The share of solar power in Brazil’s electrical grid has rapidly increased, relieving GHG emissions and diversifying energy sources for greater energy security.
Francisco José Lopes de Lima   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy