„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Telecom spam and scams in the 5G and artificial intelligence era: analyzing economic implications, technical challenges and global regulatory efforts
-
Cultivating skilled malware analysts: Clarification of practical malware dynamic analysis through interviews
-
The effect of hop-count modification attack on random walk-based SLP schemes developed for WSNs: a study
-
A conflict-aware active BLE state machine learning and state coverage-guided gray-box fuzz testing method
-
Cyber defense in OCPP for EV charging security risks
-
Identifying factors influencing the duration of zero-day vulnerabilities
-
Role of cybersecurity in microgrid adoption through the UTAUT for energy sustainability
-
HPPS - Harmonized privacy-preserving scheme for the internet of things and edge-collaborated smart city services
-
Anonymous provision of privacy-sensitive services using blockchain and decentralised storage
-
Automated cybersecurity impact propagation across business processes using process mining techniques
-
XMID-MQTT: explaining machine learning-based intrusion detection system for MQTT protocol in IoT environment
-
Further results on permutation pentanomials over finite fields with characteristic two
-
A systematic review on cybersecurity of robotic systems: vulnerabilities trends, threats, attacks, challenges, and proposed framework
-
Benchmarking the security protocol and data model (SPDM) for component authentication
-
The sound of malware: an audio fingerprinting malware detection method
-
Evaluating the Impact of Adversarial Patch Attacks on YOLO Models and the Implications for Edge AI Security
-
DOT-C: A smartphone unlock scheme based on dot-dot connection in IoT-enabled smart cities
-
Ensemble learning-based adaptive and adversarial techniques for APT attack detection
-
Leveraging digital twins for advanced threat modeling in cyber-physical systems cybersecurity
-
Clonable key fobs: Analyzing and breaking RKE protocols