Showing 1 - 14 results of 14 for search 'Hacker (computer security)', query time: 0.06s Refine Results
  1. 1

    Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms by S. G. Simonov, I. V. Lysenko

    Published 2024-09-01
    “…Spoofing has been studied as a new type of cyberattack, where masquerading as a legal object (computer, device or network) is used by hackers as a means of penetrating other computer networks. …”
    Get full text
    Article
  2. 2
  3. 3

    Data security protection schema of telecom operators under the environment of big data by Shengli ZHOU, Bin CHEN, Lifa WU

    Published 2017-05-01
    “…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
    Get full text
    Article
  4. 4

    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication by Banghua Wu, Shah Nazir, Neelam Mukhtar

    Published 2020-01-01
    “…Identification of attack is a way to identify the security violations and analyze the measures in a computer network. …”
    Get full text
    Article
  5. 5
  6. 6

    Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS) by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2024-01-01
    “…In a public channel, IoMTS must ensure information security for protection against hacker attacks. Hence, in this study, a symmetric encryption and decryption protocol was designed to ensure infosecurity of biosignals and medical images and assist in specific purposes in disease diagnosis. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications by Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez, Doris Esenarro Vargas

    Published 2021-01-01
    “…However, it is essential to note that this convenience comes with a price that involves security vulnerabilities as IoT networks are prone to be interfered with by hackers who can access the sensor/communication data and later utilize it for malicious purposes. …”
    Get full text
    Article
  13. 13

    Analysis of cyber incidents in Senegal from 2005 to 2023 by Ciré Sall

    Published 2024-12-01
    “…Based on the findings, the author recommends, inter alia, improved Senegalese government monitoring and reporting of cyber threats, with an emphasis on cooperation between the state’s Computer Security Incident Response Team (CSIRT-Senegal, or SNCSIRT) and the CSIRT-Universitaire established by tertiary institutions in the country.   …”
    Get full text
    Article
  14. 14

    Implementation of Coding Theory with The Extended Hamming Code in Steganography by Nurul Jannah, Nur Hamid

    Published 2024-01-01
    “…Data security needs to be considered to avoid noise when sending data or data breaches by hackers. …”
    Get full text
    Article