Articles with "security threats" as a keyword



The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats

Sign Up to like & get
recommendations!
Published in 2019 at "Information Systems Frontiers"

DOI: 10.1007/s10796-017-9755-1

Abstract: Individuals can perform many different behaviors to protect themselves from computer security threats. Research, however, generally explores computer security behaviors in isolation, typically looking at one behavior per study, such as usage of malware or… read more here.

Keywords: security behaviors; response; security threats; security ... See more keywords

Cyber Security Threats Detection in IoT Using Krill Based Deep Neural Network Stacked Auto Encoders

Sign Up to like & get
recommendations!
Published in 2024 at "Wireless Personal Communications"

DOI: 10.1007/s11277-024-11002-9

Abstract: The Internet of things (IoT) has concerned much significance for some manufacturing sectors including clinical fields, co-ordinations following, savvy urban communities, and automobiles. Anyway as a worldview, it is sensitive to different sorts of cyber-attacks.… read more here.

Keywords: based deep; cyber security; deep neural; security ... See more keywords
Photo from wikipedia

Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study

Sign Up to like & get
recommendations!
Published in 2020 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-019-04319-2

Abstract: There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to… read more here.

Keywords: study; security threats; cyber security; security ... See more keywords
Photo from wikipedia

Barracks and barricades: how internal security threats affect foreign basing access in the Philippines

Sign Up to like & get
recommendations!
Published in 2020 at "Asian Security"

DOI: 10.1080/14799855.2020.1862087

Abstract: This paper presents a theory of foreign military basing as a function of the degree of internal threat facing a host nation. The theory is based on rational choice logic where politicians balance e... read more here.

Keywords: threats affect; internal security; security threats; barricades internal ... See more keywords

Future security threats arising from the UK’s deprivation of citizenship: a model to understand the human rights-security risk landscape

Sign Up to like & get
recommendations!
Published in 2024 at "Critical Studies on Terrorism"

DOI: 10.1080/17539153.2024.2373857

Abstract: ABSTRACT Following the collapse of the Islamic State, the issue of “Returning Foreign Fighters” became a dominant global problem. The securitised response adopted by many states is a cause for concern, particularly in relation to… read more here.

Keywords: human rights; future security; risk; model ... See more keywords

Machine Learning Security: Threats, Countermeasures, and Evaluations

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2987435

Abstract: Machine learning has been pervasively used in a wide range of applications due to its technical breakthroughs in recent years. It has demonstrated significant success in dealing with various complex problems, and shows capabilities close… read more here.

Keywords: machine; security threats; machine learning; learning security ... See more keywords

Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3089681

Abstract: The Internet of Things (IoT) has emerged as a technology capable of connecting heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily lives simpler, safer, and fruitful. Being part of a large network… read more here.

Keywords: artificial intelligence; internet things; security threats; security ... See more keywords

Security Threats and Mitigation Techniques in UAV Communications: A Comprehensive Survey

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3215975

Abstract: Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new applications and services, including military and rescue operations, aerial surveillance, civilian applications, precision farming, as well as providing extensive wireless network access in remote… read more here.

Keywords: uav communications; security; security threats; comprehensive survey ... See more keywords

A Systematic Literature Review of Inter-Service Security Threats and Mitigation Strategies in Microservice Architectures

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3406500

Abstract: Ensuring security is of paramount importance in microservice architectures, given their distributed nature, involving numerous services and network-spanning interactions. This architectural style, which can comprise hundreds to thousands of services, inherently presents a more extensive… read more here.

Keywords: mitigation strategies; threats mitigation; microservice architectures; security ... See more keywords

Unknown Threats Detection Methods of Smart Contracts

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2023.3299492

Abstract: With the explosive growth of blockchain platforms and applications, security threats of blockchain also occur frequently. As a decentralized application deployed on the blockchain, smart contracts help the blockchain realize safe and efficient information storage,… read more here.

Keywords: detection methods; unknown threats; threats detection; smart contracts ... See more keywords

Threat Detection in Trigger-Action Programming Rules of Smart Home With Heterogeneous Information Network Model

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2024.3362950

Abstract: The increased utilization of trigger-action programming (TAP) rules in smart homes has raised concerns regarding potential security threats in the interactions between smart digital devices/online services (DD/OSs) and the physical environment. To ensure the secure… read more here.

Keywords: trigger action; threat; action programming; rules smart ... See more keywords