Results 21 to 30 of about 470,699 (271)
An Empirical Study on Android-related Vulnerabilities
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and keys. Basically, they embed most of our private information in our pocket.
Bavota, Gabriele +2 more
core +1 more source
Classification of logical vulnerability based on group attacking method [PDF]
New advancement in the field of e-commerce software technology has also brought many benefits, at the same time developing process always face different sort of problems from design phase to implement phase.
Nabi, Faisal +2 more
core +2 more sources
Threat Modeling—How to Visualize Attacks on IOTA?
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased ...
Ikram Ullah +3 more
doaj +1 more source
TOWARDS GREEN RESILIENT CITIES IN EASTERN EUROPEAN UNION COUNTRIES [PDF]
Investing in green facilities is a process of urban renewal that can transform cities by enhancing the quality of life, strengthening the local economy and reducing environmental impact.
Alexandru BĂNICĂ +2 more
doaj +1 more source
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response
Considerable delays often exist between the discovery of a vulnerability and the issue of a patch. One way to mitigate this window of vulnerability is to use a configuration workaround, which prevents the vulnerable code from being executed at the cost ...
D'Angelo, Mariana +3 more
core +1 more source
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices.
Nikolaos Koutroumpouchos +2 more
doaj +1 more source
: Female genital mutilation is one harmful traditional practice that is highly prevalent in African countries such as Guinea, Sierra Leone, the Gambia, Mauritania, Mali, and Burkina Faso, as well as in Sudan, Egypt, and Ethiopia.
Habtamu Wondimu +2 more
doaj +1 more source
Industrial Control Systems (ICS), which include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers (PLC), play a crucial role in managing and regulating industrial processes ...
Mary Nankya, Robin Chataut, Robert Akl
doaj +1 more source
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and
Edkrantz M. +4 more
core +1 more source
Reducing uncertainties of climate projections on solar energy resources in Brazil
The share of solar power in Brazil’s electrical grid has rapidly increased, relieving GHG emissions and diversifying energy sources for greater energy security.
Francisco José Lopes de Lima +7 more
doaj +1 more source

