-
1
Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms
Published 2024-09-01“…Spoofing has been studied as a new type of cyberattack, where masquerading as a legal object (computer, device or network) is used by hackers as a means of penetrating other computer networks. …”
Get full text
Article -
2
-
3
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01“…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
Get full text
Article -
4
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01“…Identification of attack is a way to identify the security violations and analyze the measures in a computer network. …”
Get full text
Article -
5
Explainable artificial intelligence in web phishing classification on secure IoT with cloud-based cyber-physical systems
Published 2025-01-01“…Cyber-physical systems (CPS) contain control and computation components, which are compactly assured with physical procedures. …”
Get full text
Article -
6
Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)
Published 2024-01-01“…In a public channel, IoMTS must ensure information security for protection against hacker attacks. Hence, in this study, a symmetric encryption and decryption protocol was designed to ensure infosecurity of biosignals and medical images and assist in specific purposes in disease diagnosis. …”
Get full text
Article -
7
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01Get full text
Article -
8
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01Get full text
Article -
9
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01Get full text
Article -
10
Framework to analyze and exploit the smart home IoT firmware
Published 2025-02-01Get full text
Article -
11
-
12
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Published 2021-01-01“…However, it is essential to note that this convenience comes with a price that involves security vulnerabilities as IoT networks are prone to be interfered with by hackers who can access the sensor/communication data and later utilize it for malicious purposes. …”
Get full text
Article -
13
Analysis of cyber incidents in Senegal from 2005 to 2023
Published 2024-12-01“…Based on the findings, the author recommends, inter alia, improved Senegalese government monitoring and reporting of cyber threats, with an emphasis on cooperation between the state’s Computer Security Incident Response Team (CSIRT-Senegal, or SNCSIRT) and the CSIRT-Universitaire established by tertiary institutions in the country. …”
Get full text
Article -
14
Implementation of Coding Theory with The Extended Hamming Code in Steganography
Published 2024-01-01“…Data security needs to be considered to avoid noise when sending data or data breaches by hackers. …”
Get full text
Article