UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

2 3 4 5 6
zadetkov: 582
31.
  • Continuous auditing and thr... Continuous auditing and threat detection in multi-cloud infrastructure
    Torkura, K.A.; Sukmana, Muhammad I.H.; Cheng, Feng ... Computers & security, March 2021, 2021-03-00, 20210301, Letnik: 102
    Journal Article
    Recenzirano
    Odprti dostop

    Efficient change control and configuration management is imperative for addressing the emerging security threats in cloud infrastructure. These threats majorly exploit misconfiguration ...
Celotno besedilo

PDF
32.
  • Inexperienced preys know wh... Inexperienced preys know when to flee or to freeze in front of a threat
    Hébert, Marie; Versace, Elisabetta; Vallortigara, Giorgio Proceedings of the National Academy of Sciences - PNAS, 11/2019, Letnik: 116, Številka: 46
    Journal Article
    Recenzirano
    Odprti dostop

    Using appropriate antipredatory responses is crucial for survival. While slowing down reduces the chances of being detected from distant predators, fleeing away is advantageous in front of an ...
Celotno besedilo

PDF
33.
  • An Insider Data Leakage Det... An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques
    Al-Shehari, Taher; Alsowail, Rakan A Entropy (Basel, Switzerland), 09/2021, Letnik: 23, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    Insider threats are malicious acts that can be carried out by an authorized employee within an organization. Insider threats represent a major cybersecurity challenge for private and public ...
Celotno besedilo

PDF
34.
  • Detection of explosive mate... Detection of explosive materials in dual-energy X-Ray security systems
    Yalçın, Ozan; Reyhancan, İskender Atilla Nuclear instruments & methods in physics research. Section A, Accelerators, spectrometers, detectors and associated equipment, 10/2022, Letnik: 1040
    Journal Article
    Recenzirano

    Due to the increasing security needs, X-ray devices have started to be used more and more in security systems. Dual-energy X-ray devices are preferred to conventional ones since they enable Effective ...
Celotno besedilo
35.
  • A Survey on Threat Hunting ... A Survey on Threat Hunting in Enterprise Networks
    Nour, Boubakr; Pourzandi, Makan; Debbabi, Mourad IEEE Communications surveys and tutorials, 10/2023, Letnik: 25, Številka: 4
    Journal Article
    Recenzirano

    With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in data generation ...
Celotno besedilo
36.
  • Both fearful and happy expr... Both fearful and happy expressions interact with gaze direction by 200 ms SOA to speed attention orienting
    McCrackin, Sarah D.; Itier, Roxane J. Visual cognition, 04/2018, Letnik: 26, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Attention orienting towards a gazed-at location is fundamental to social attention. Whether gaze cues can interact with emotional expressions other than those signalling environmental threat to ...
Celotno besedilo

PDF
37.
  • Semi-Supervised Cyber Threa... Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach
    Ebrahimi, Mohammadreza; Nunamaker, Jay F.; Chen, Hsinchun Journal of management information systems, 07/2020, Letnik: 37, Številka: 3
    Journal Article
    Recenzirano

    Dark Net Marketplaces (DNMs), online selling platforms on the dark web, constitute a major component of the underground economy. Due to the anonymity and increasing accessibility of these platforms, ...
Celotno besedilo
38.
  • DNS Rebinding Threat Modeli... DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems
    He, Xudong; Wang, Jian; Liu, Jiqiang ... IEEE transactions on intelligent transportation systems, 02/2023, Letnik: 24, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Maritime ships and ports have become increasingly digital and intelligent. While intelligent maritime transportation systems bring convenience to the maritime industry, ship operation and management ...
Celotno besedilo
39.
  • A Survey of Securing Networ... A Survey of Securing Networks Using Software Defined Networking
    Ali, Syed Taha; Sivaraman, Vijay; Radford, Adam ... IEEE transactions on reliability, 09/2015, Letnik: 64, Številka: 3
    Journal Article
    Recenzirano

    Software Defined Networking (SDN) is rapidly emerging as a new paradigm for managing and controlling the operation of networks ranging from the data center to the core, enterprise, and home. The ...
Celotno besedilo
40.
  • Managing Cybersecurity Thre... Managing Cybersecurity Threats and Increasing Organizational Resilience
    2023
    eBook
    Odprti dostop

    Cybersecurity attacks are increasing in sophistication and intensity and are known to have a disruptive effect on organizations and society. This reprint contains a range of papers that address ...
Celotno besedilo
2 3 4 5 6
zadetkov: 582

Nalaganje filtrov