Treffer 1 - 20 von 71.695

1

Attacks Come to Those Who Wait: Long-Term Observations in an SSH Honeynet
Munteanu, Cristian ; Suriyanarayanan, Yogesh Bhargav ; Smaragdakis, Georgios ; et al.
Proceedings of the 2025 ACM Internet Measurement Conference. :628-644

Konferenz
2

Ransomware analysis: knowledge extraction and classification for advanced cyber threat intelligence
Lanza, Claudia, VerfasserIn, aut ; Lahmadi, Abdelkader, aut, VerfasserIn ; François, Jérôme, (DE-588)1359688552, (DE-627)1919689621, aut, VerfasserIn ; et al.
2025

Buch
3

RADAR: A FRAMEWORK FOR DEVELOPING ADVERSARIALLY ROBUST CYBER DEFENSE AI AGENTS WITH DEEP REINFORCEMENT LEARNING.
Ebrahimi, Reza ; Chai, Yidong ; Li, Weifeng ; et al.
MIS Quarterly. Dec2025, Vol. 49 Issue 4, p1385-1416. 32p. 11 Color Photographs, 2 Diagrams, 10 Charts.

Intelligent agents Computer crimes Internet security Reinforcement learning Robust optimization
Fachzeitschrift
4

THE FOG OF WARNINGS: HOW NON-SECURITY-RELATED NOTIFICATIONS DIMINISH THE EFFICACY OF SECURITY WARNINGS.
Vance, Anthony ; Eargle, Dave ; Kirwan, C. Brock ; et al.
MIS Quarterly. Dec2025, Vol. 49 Issue 4, p1357-1384. 28p. 20 Color Photographs, 1 Diagram, 6 Charts.

Warnings Internet security Habituation (Neuropsycho... Functional magnetic reso... Stimulus generalization
Fachzeitschrift
5

Defending the metaverse: cybersecurity strategies for the next generation internet
Sheth, R. K., edt, HerausgeberIn ; 1\p, Ouaissa, Mariya, (DE-588)1272975355, (DE-627)182274086X, edt, HerausgeberIn ; 2\p, Ouaissa, Mariyam, (DE-588)1259340570, (DE-627)1806160358, edt, HerausgeberIn ; et al.
2025

Buch
6

Cybermedics: navigating AI and security in the medical field
Sapra, Varun, (DE-588)1345079958, (DE-627)1905842147, edt, HerausgeberIn ; Tanwar, Rohit, edt, HerausgeberIn ; Sapra, Luxmi, (DE-588)1345079443, (DE-627)190584199X, edt, HerausgeberIn
2025

Buch
7

Navigating the Cyber Maze: Insights and Humor on the Digital Frontier
1\p, Muhlert, Matthias, VerfasserIn, (DE-588)1373134305, (DE-627)1932457941, aut ; 1\p, Muhlert, Matthias, VerfasserIn, (DE-588)1373134305, (DE-627)1932457941, aut
2025

Buch
8

Cyber Investigations of Smart Devices
Bhardwaj, Akashdeep, VerfasserIn, (DE-588)1284516636, (DE-627)1840191341, aut ; Bhardwaj, Akashdeep, VerfasserIn, (DE-588)1284516636, (DE-627)1840191341, aut
2025

Buch
9

Ransomware evolution
Ahmed, Mohiuddin, (DE-588)1171267215, (DE-627)104046615X, (DE-576)513673229, edt, HerausgeberIn
2025

Buch
10

Offensive and defensive cyber security strategies: fundamentals, theory and practices
Ouaissa, Mariya, VerfasserIn, (DE-588)1272975355, (DE-627)182274086X, aut ; Ouaissa, Mariyam, (DE-588)1259340570, (DE-627)1806160358, aut, VerfasserIn ; Ouaissa, Mariya, VerfasserIn, (DE-588)1272975355, (DE-627)182274086X, aut
2025

Buch
11

Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates
Liu, Enze ; Kappos, George ; Mugnier, Eric ; et al.
Proceedings of the 2024 ACM on Internet Measurement Conference. :704-712

Konferenz
12

Overview of Mobile Security Detection Technologies in Internet Traffic
Liang, Haobo ; Chen, Jie ; Leng, Yingxiong ; et al.
Proceedings of the 2024 9th International Conference on Cyber Security and Information Engineering. :182-192

Konferenz
13

Advocating for Consumer Privacy Protection in an Era of Widespread Exposure.
Brough, Aaron R. ; Martin, Kelly D. ; Kamleitner, Bernadette
Journal of the Association for Consumer Research. Jul2025, Vol. 10 Issue 3, p221-225. 5p.

Privacy Data protection Disclosure Personally identifiable... Power (Social sciences) Social change
Fachzeitschrift
14

Monitoring the Validity, Functionality, and Security of Internet SSL Certificates
Durikovic, Roman ; Kelemen, Jan
2025 Communication and Information Technologies (KIT) Communication and Information Technologies (KIT), 2025. :1-8 Oct, 2025

Konferenz
15

Securing unmanned aerial vehicle—heterogeneous networks using functional encryption scheme
Gupta, Sachin Kumar ; Gupta, Parul ; Singh, Pawan
Multimedia Tools and Applications: An International Journal. 84(35):43785-43803

Fachzeitschrift
16

Cybersecurity in the Arab World: Technological and Socio-Political Dimensions.
Abdennadher, Slim ; Ali, Raian ; Dacier, Marc ; et al.
Communications of the ACM. Oct2025, Vol. 68 Issue 10, p72-77. 6p.

Transportation managemen... Data integrity Cyberterrorism Internet security Interconnected power sys... Risk perception
Zeitschrift
17

Grand Challenges in Trustworthy Computing at 20: A Retrospective Look at the Second CRA Grand Challenges Conference.
DeMillo, Richard A. ; Spafford, Eugene H.
Communications of the ACM. Sep2025, Vol. 68 Issue 9, p54-61. 8p.

Conferences & convention... Computer viruses Computer crimes Internet security Link spam (Internet) Denial of service attack...
Zeitschrift
18

Towards the Increasing Usage of IPv6 & Its Implication: A Literature Review
Blancaflor, Eric ; Unciano, Catherine Dianne ; Arcigal, Erwin Mark ; et al.
Proceedings of the 2024 10th International Conference on Computing and Artificial Intelligence. :373-378

Konferenz
19

Technology transformation: analyzing its impact on internet security and compliance in an organization
Singh, Manjinder ; Mittal, Amit ; Malik, Varun ; et al.
International Journal of System Assurance Engineering and Management. 16(7):2506-2521

Fachzeitschrift
20

Reconfigurable Intelligent Surface-Assisted Cross-Layer Authentication for Secure and Efficient Vehicular Communications
Shawky, M.A. ; Tariq Shah, S. ; Gamal Abdellatif, A. ; et al.
IEEE Internet of Things Journal IEEE Internet Things J. Internet of Things Journal, IEEE. 12(24):54450-54467 Dec, 2025

Fachzeitschrift

Filter