Articles with "security threats" as a keyword



Photo by scottwebb from unsplash

The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats

Sign Up to like & get
recommendations!
Published in 2019 at "Information Systems Frontiers"

DOI: 10.1007/s10796-017-9755-1

Abstract: Individuals can perform many different behaviors to protect themselves from computer security threats. Research, however, generally explores computer security behaviors in isolation, typically looking at one behavior per study, such as usage of malware or… read more here.

Keywords: security behaviors; response; security threats; security ... See more keywords
Photo from wikipedia

Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study

Sign Up to like & get
recommendations!
Published in 2020 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-019-04319-2

Abstract: There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to… read more here.

Keywords: study; security threats; cyber security; security ... See more keywords
Photo from wikipedia

Barracks and barricades: how internal security threats affect foreign basing access in the Philippines

Sign Up to like & get
recommendations!
Published in 2020 at "Asian Security"

DOI: 10.1080/14799855.2020.1862087

Abstract: This paper presents a theory of foreign military basing as a function of the degree of internal threat facing a host nation. The theory is based on rational choice logic where politicians balance e... read more here.

Keywords: threats affect; internal security; security threats; barricades internal ... See more keywords
Photo by possessedphotography from unsplash

Machine Learning Security: Threats, Countermeasures, and Evaluations

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2987435

Abstract: Machine learning has been pervasively used in a wide range of applications due to its technical breakthroughs in recent years. It has demonstrated significant success in dealing with various complex problems, and shows capabilities close… read more here.

Keywords: machine; security threats; machine learning; learning security ... See more keywords
Photo from wikipedia

Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3089681

Abstract: The Internet of Things (IoT) has emerged as a technology capable of connecting heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily lives simpler, safer, and fruitful. Being part of a large network… read more here.

Keywords: artificial intelligence; internet things; security threats; security ... See more keywords
Photo from wikipedia

Security Threats and Mitigation Techniques in UAV Communications: A Comprehensive Survey

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3215975

Abstract: Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new applications and services, including military and rescue operations, aerial surveillance, civilian applications, precision farming, as well as providing extensive wireless network access in remote… read more here.

Keywords: uav communications; security; security threats; comprehensive survey ... See more keywords
Photo by jordanharrison from unsplash

NFV: Security Threats and Best Practices

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.2017.1600899

Abstract: Network function virtualization (NFV) yields numerous benefits, particularly the possibility of a cost-efficient transition of telco hardware functionalities on the software platform to break the vendor lock-in problem. These benefits come at the price of… read more here.

Keywords: nfv security; security threats; security; threats best ... See more keywords
Photo from wikipedia

Energy Big Data Security Threats in IoT-Based Smart Grid Communications

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.2017.1700154

Abstract: Increased intelligence and automation in smart grid results in many heterogeneous applications benefiting from the Internet of Things, such as demand response, energy delivery efficiency/reliability, and fault recovery. However, vulnerabilities in smart grid arise due… read more here.

Keywords: big data; energy; security threats; energy big ... See more keywords
Photo from wikipedia

Security Threats and Cellular Network Procedures for Unmanned Aircraft Systems: Challenges and Opportunities

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Communications Standards Magazine"

DOI: 10.1109/mcomstd.0003.2100108

Abstract: Researchers and standardization bodies have raised concerns about using legacy cellular networks for supporting unmanned aerial vehicle (UAV) operations. Different from traditional user equipment (UE), an unmanned aircraft system (UAS)-capable UE - UAV-UE or controller-UE… read more here.

Keywords: network; unmanned aircraft; security; security threats ... See more keywords
Photo from wikipedia

A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2022.3164678

Abstract: Impressive technological advancements over the past decades commenced significant advantages in the maritime industry sector and elevated commercial, operational, and financial benefits. However, technological development introduces several novel risks that pose serious and potential threats… read more here.

Keywords: cyber security; security; security threats; maritime industry ... See more keywords
Photo by scottwebb from unsplash

A Systematic Survey: Security Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directions

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2022.3220043

Abstract: Unmanned aerial vehicles (UAVs) as an intermediary can offer an efficient and useful communication paradigm for different Internet of Things (IoT) applications. Following the operational capabilities of IoTs, this emerging technology could be extremely helpful… read more here.

Keywords: iot applications; uav aided; security; security threats ... See more keywords