Results 221 to 230 of about 23,723 (266)
Some of the next articles are maybe not open access.
Computer abuse perpetrators and vulnerabilities of computer systems
Proceedings of the June 7-10, 1976, national computer conference and exposition on - AFIPS '76, 1976Analysis of computer abuse experience is valuable in threat and risk studies performed to develop appropriate safeguards in computer use. A profile of computer abuse perpetrators has been developed on the basis of interviews with 17 offenders involved in a total of 15 cases.
openaire +1 more source
Exposing vulnerabilities of untrusted computing platforms
2012 IEEE 30th International Conference on Computer Design (ICCD), 2012This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans ...
Yier Jin +2 more
openaire +1 more source
Cloud Computing Cyber Threats and Vulnerabilities
2023Cloud computing has become an integral part of modern business operations, with organizations of all sizes and in all industries turning to the cloud to improve efficiency, reduce costs, and increase flexibility. However, the adoption of cloud computing has also introduced a range of new security challenges, as sensitive data and critical systems are ...
openaire +1 more source
Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing
2011 IEEE 10th International Symposium on Network Computing and Applications, 2011In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on a single physical system, each executing a separate operating system instance. The hypervisor schedules execution of these VMs much as the scheduler in an operating system does, balancing factors such as fairness and I/O performance.
Zhou, Fangfei +3 more
openaire +1 more source
The Rising Tide Of Computational Vulnerability
Delicate Balance: Technics, Culture and Consequences, 1989Computer evolution brings ever greater benefits, and ever greater danger as well. Emerging are the worm, virus, and otherwise surreptitious softwares. They billiantly expose the current ethics of computer use to intense public scrutiny. They are (obliquely) t he object of research in Artificial Life studies, for they possess some of the attributes of ...
openaire +1 more source
Vulnerabilities and storage security in cloud computing
2015 International Conference on Cloud Technologies and Applications (CloudTech), 2015Nowadays, Cloud computing is a major trend. It is a new data hosting technology that becomes very popular lately thanks to the amortization of costs induced to companies. Since this concept is still in its first stages, new security risks start to appear. This paper will set forth the major security issues in cloud computing and propound a new solution
Mostapha Derfouf +2 more
openaire +1 more source
Cloud Computing: Vulnerability and Threat Indications
2019An innovative approach of providing and delivering resources is the new emerging technology “cloud computing.” The time demands a reduction in expenditure as an end result of financial restrictions, where cloud computing has established productive position and is seeing immense large-scale investment.
Vaishali Singh, S. K. Pandey
openaire +1 more source
Exploiting Security Vulnerabilities in Intermittent Computing
2018Energy harvesters have enabled widespread utilization of ultra-low-power devices that operate solely based on the energy harvested from the environment. Due to the unpredictable nature of harvested energy, these devices experience frequent power outages.
Archanaa S. Krishnan, Patrick Schaumont
openaire +1 more source
Computers in Hospitals, Vulnerability Aspects
1991With the advancement of medicine the dependency on adequate information supply has gradually increased. In the early days of medicine the patient had only to deal with’his’ doctor who collected the data himself (if any), stored them in his own brain, where also most of his expertise was stored.
openaire +1 more source

