Results 41 to 50 of about 36,499 (202)

A Web-Based Honeypot in IPv6 to Enhance Security

open access: yesInformation, 2020
IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet.
Keyong Wang   +3 more
doaj   +1 more source

Associating cognitive abilities with naturalistic search behavior

open access: yesJournal of the Association for Information Science and Technology, Volume 76, Issue 4, Page 665-685, April 2025.
Abstract Differences in cognitive abilities affect search behaviors, but this has mostly been observed in laboratory experiments. There is limited research on how users search for information in real‐world, naturalistic settings and how real‐world search behaviors relate to cognitive abilities.
Tung Vuong   +2 more
wiley   +1 more source

Analisis Keamanan Website Open Journal System Menggunakan Metode Vulnerability Assessment

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2020
Open Journal System (OJS) merupakan perangkat lunak yang berfungsi sebagai sarana publikasi ilmiah dan digunakan diseluruh dunia. OJS yang tidak dipantau beresiko diserang oleh hacker.
Imam Riadi, Anton Yudhana, Yunanri W
doaj   +1 more source

Centralized Web Application Firewall Security System

open access: yesModern Applied Science, 2018
In this paper we propose a centralized web firewall system for web application security which will provide a new type of synchronized system, which has the ability to  detect  and prevent a variety of web application attacks for a wide range of hosts at the same time , using an centralized command and control system, the attacked ...
Saher Manaseer, Ahmad K. Al Hwaitat
openaire   +2 more sources

Corporate Decarbonization via Technology and Management

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study provides a comprehensive overview of key findings on decarbonization, advanced technologies, and management strategies, highlighting emerging themes shaping the field. Advanced technologies enhance carbon reduction through efficiency, real‐time monitoring, and optimizing resource optimization.
Heidy Montero‐Teran   +2 more
wiley   +1 more source

A Multi-Source Feedback-Driven Framework for Generating WAF Test Cases

open access: yesFuture Internet
Web application firewalls (WAFs) are critical defenses against persistent threats to web applications, yet their security evaluation remains challenging.
Pengcheng Lu   +3 more
doaj   +1 more source

Machine Learning Blunts the Needle of Advanced SQL Injections

open access: yesMendel, 2019
SQL injection is one of the most popular and serious information security threats. By exploiting database vulnerabilities, attackers may get access to sensitive data or enable compromised computers to conduct further network attacks.
Marina Volkova   +2 more
doaj   +1 more source

Defending Against Denial of Service [PDF]

open access: yes, 2012
Civil Society currently faces significant cyber threats. At the top of the list of those threats are Denial of Service (DoS) attacks. The websites of many organizations and individuals have already come under such attacks, and the frequency of those ...

core  

Risks and remedies in e-learning system

open access: yes, 2012
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher ...
Barik, Nikhilesh, Karforma, Sunil
core   +1 more source

A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets [PDF]

open access: yes, 2019
open access articleThe Internet of Things (IoT) introduced the opportunity of remotely manipulating home appliances (such as heating systems, ovens, blinds, etc.) using computers and mobile devices.
Cruz, Bruno   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy