Sign Up to like & get
recommendations!
0
Published in 2019 at "Information Systems Frontiers"
DOI: 10.1007/s10796-017-9755-1
Abstract: Individuals can perform many different behaviors to protect themselves from computer security threats. Research, however, generally explores computer security behaviors in isolation, typically looking at one behavior per study, such as usage of malware or…
read more here.
Keywords:
security behaviors;
response;
security threats;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Wireless Personal Communications"
DOI: 10.1007/s11277-024-11002-9
Abstract: The Internet of things (IoT) has concerned much significance for some manufacturing sectors including clinical fields, co-ordinations following, savvy urban communities, and automobiles. Anyway as a worldview, it is sensitive to different sorts of cyber-attacks.…
read more here.
Keywords:
based deep;
cyber security;
deep neural;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Arabian Journal for Science and Engineering"
DOI: 10.1007/s13369-019-04319-2
Abstract: There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to…
read more here.
Keywords:
study;
security threats;
cyber security;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Asian Security"
DOI: 10.1080/14799855.2020.1862087
Abstract: This paper presents a theory of foreign military basing as a function of the degree of internal threat facing a host nation. The theory is based on rational choice logic where politicians balance e...
read more here.
Keywords:
threats affect;
internal security;
security threats;
barricades internal ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Critical Studies on Terrorism"
DOI: 10.1080/17539153.2024.2373857
Abstract: ABSTRACT Following the collapse of the Islamic State, the issue of “Returning Foreign Fighters” became a dominant global problem. The securitised response adopted by many states is a cause for concern, particularly in relation to…
read more here.
Keywords:
human rights;
future security;
risk;
model ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2987435
Abstract: Machine learning has been pervasively used in a wide range of applications due to its technical breakthroughs in recent years. It has demonstrated significant success in dealing with various complex problems, and shows capabilities close…
read more here.
Keywords:
machine;
security threats;
machine learning;
learning security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3089681
Abstract: The Internet of Things (IoT) has emerged as a technology capable of connecting heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily lives simpler, safer, and fruitful. Being part of a large network…
read more here.
Keywords:
artificial intelligence;
internet things;
security threats;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3215975
Abstract: Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new applications and services, including military and rescue operations, aerial surveillance, civilian applications, precision farming, as well as providing extensive wireless network access in remote…
read more here.
Keywords:
uav communications;
security;
security threats;
comprehensive survey ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3406500
Abstract: Ensuring security is of paramount importance in microservice architectures, given their distributed nature, involving numerous services and network-spanning interactions. This architectural style, which can comprise hundreds to thousands of services, inherently presents a more extensive…
read more here.
Keywords:
mitigation strategies;
threats mitigation;
microservice architectures;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2023.3299492
Abstract: With the explosive growth of blockchain platforms and applications, security threats of blockchain also occur frequently. As a decentralized application deployed on the blockchain, smart contracts help the blockchain realize safe and efficient information storage,…
read more here.
Keywords:
detection methods;
unknown threats;
threats detection;
smart contracts ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2024.3362950
Abstract: The increased utilization of trigger-action programming (TAP) rules in smart homes has raised concerns regarding potential security threats in the interactions between smart digital devices/online services (DD/OSs) and the physical environment. To ensure the secure…
read more here.
Keywords:
trigger action;
threat;
action programming;
rules smart ... See more keywords