UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 148
1.
  • Blockchain Technology: Emer... Blockchain Technology: Emerging Applications and Use Cases for Secure and Trustworthy Smart Systems
    B. Rawat, Danda; Chaudhary, Vijay; Doku, Ronald Journal of cybersecurity and privacy, 03/2021, Letnik: 1, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Blockchain, also known as a distributed ledger technology, stores different transactions/operations in a chain of blocks in a distributed manner without needing a trusted third-party. Blockchain is ...
Celotno besedilo

PDF
2.
  • Launching Adversarial Attac... Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
    Papadopoulos, Pavlos; Thornewill von Essen, Oliver; Pitropakis, Nikolaos ... Journal of cybersecurity and privacy, 06/2021, Letnik: 1, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market ...
Celotno besedilo

PDF
3.
  • Enhancing Machine Learning ... Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector
    Ahsan, Mostofa; Gomes, Rahul; Chowdhury, Md. Minhaz ... Journal of cybersecurity and privacy, 03/2021, Letnik: 1, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Machine learning algorithms are becoming very efficient in intrusion detection systems with their real time response and adaptive learning process. A robust machine learning model can be deployed for ...
Celotno besedilo

PDF
4.
  • The State of Ethereum Smart... The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
    Zhou, Haozhe; Milani Fard, Amin; Makanju, Adetokunbo Journal of cybersecurity and privacy, 06/2022, Letnik: 2, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Smart contracts are self-executing programs that run on the blockchain and make it possible for peers to enforce agreements without a third-party guarantee. The smart contract on Ethereum is the ...
Celotno besedilo
5.
  • Detection of SQL Injection ... Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
    Alghawazi, Maha; Alghazzawi, Daniyal; Alarifi, Suaad Journal of cybersecurity and privacy, 12/2022, Letnik: 2, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    An SQL injection attack, usually occur when the attacker(s) modify, delete, read, and copy data from database servers and are among the most damaging of web application attacks. A successful SQL ...
Celotno besedilo
6.
  • Security and Privacy Manage... Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
    Hireche, Rachida; Mansouri, Houssem; Pathan, Al-Sakib Khan Journal of cybersecurity and privacy, 09/2022, Letnik: 2, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    The Internet of Medical Things (IoMT) has become a strategic priority for future e-healthcare because of its ability to improve patient care and its scope of providing more reliable clinical data, ...
Celotno besedilo
7.
  • A Survey of the Recent Tren... A Survey of the Recent Trends in Deep Learning Based Malware Detection
    Tayyab, Umm-e-Hani; Khan, Faiza Babar; Durad, Muhammad Hanif ... Journal of cybersecurity and privacy, 12/2022, Letnik: 2, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying malicious activity. Malicious activities potentially lead to a system breach or data compromise. Various tools and ...
Celotno besedilo
8.
  • Functionality-Preserving Ad... Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey
    McCarthy, Andrew; Ghadafi, Essam; Andriotis, Panagiotis ... Journal of cybersecurity and privacy, 03/2022, Letnik: 2, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Machine learning has become widely adopted as a strategy for dealing with a variety of cybersecurity issues, ranging from insider threat detection to intrusion and malware detection. However, by ...
Celotno besedilo
9.
  • Cybersecurity Threats and T... Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
    Ahsan, Mostofa; Nygard, Kendall E.; Gomes, Rahul ... Journal of cybersecurity and privacy, 09/2022, Letnik: 2, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Machine learning is of rising importance in cybersecurity. The primary objective of applying machine learning in cybersecurity is to make the process of malware detection more actionable, scalable ...
Celotno besedilo
10.
  • Cybersecurity Practices for... Cybersecurity Practices for Social Media Users: A Systematic Literature Review
    Herath, Thilini B. G.; Khanna, Prashant; Ahmed, Monjur Journal of cybersecurity and privacy, 01/2022, Letnik: 2, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we present secondary research on recommended cybersecurity practices for social media users from the user’s point of view. Through following a structured methodological approach of the ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 148

Nalaganje filtrov