Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
This paper discusses the development of new hardware and software for protecting access to HMI/SCADA systems via Unprotected Internet Networks (UPN), mainly when working remotely with confidential information. Based on the analysis... more
    • by 
    •   10  
      Cognitive ScienceComputer ScienceComputer SecurityMedicine
The ever-increasing growth of the Internet is leading to its widespread use for various purposes. Research shows that, due to low publication barrier to content uploader, anonymity of uploader, exposure to millions of users and a... more
    • by 
Behavior in using inappropriate technology and low level of individual awareness causes a high risk of cybercrime. This study aims to see the behavior and awareness of information security among users of the Zoom application, especially... more
    • by 
    •   2  
      Information SecurityHacker
En los últimos veinte años se ha desarrollado un movimiento de (Bio)hacking, observando variadas prácticas y formas: en algunos países más definidas y comunitarias, y en otras más desagregadas e individualistas. Este fenómeno, inserto en... more
    • by 
    •   2  
      HumanitiesHacker
    • by 
    •   2  
      tugas eptik bsiEPTIK
    • by 
    •   6  
      Computer ScienceComputer SecurityHackerLibrary and Information Studies
Some of the fast-expanding areas of concern in the realm of cybersecurity are cybercrime-as-a-service (CaaS) and AI-enabled threats. CaaS refers to the usage of online markets or platforms where people or organizations can buy or rent the... more
    • by 
    •   14  
      Computer ScienceHuman Computer InteractionInformation SecurityComputer Engineering
The 4IR or the digital revolution refers to a collective term for a value chain organizational concepts and technologies that together build the Internet of Things, Internet of people, Cyber-Physical Systems (CPS), Internet of Services... more
    • by 
    •   6  
      Civil EngineeringRisk ManagementThe InternetHacker
Propolis has been shown to exibit in vitro antimicrobial activity against periodontal pathogens. The aim of this study was to evaluate the efficacy of Brazilian Green Propolis Gel (BGPG) for the treatment of patients diagnosed with... more
    • by 
    •   12  
      DentistryMedicineHackerPropolis
    • by 
    •   7  
      Cognitive SciencePhilosophyAestheticsDialectic
This study aims to identify the needs analysis of a company in involving ethical hackers to achieve the desired goals. This research focuses on accounting information systems which are vital systems in business processes. The... more
    • by 
    •   5  
      DocumentationHackerAccounting Information SystemControl Management
    • by 
    •   4  
      Computer ScienceDigital InvestigationHackerCrab Biology and Taxonomy
    • by 
    •   7  
      Information SystemsSociologyManagement Information SystemsHacker
    • by 
    •   7  
      Information SystemsSociologyManagement Information SystemsHacker
    • by 
    •   11  
      Computer ScienceComputer SecurityHackerWeb Application Security
    • by 
    •   7  
      Computer ScienceArtificial IntelligenceMachine LearningApplied Linguistics
Threats are nuisance to the information technology world. Today we have different kind of threats which includes, hacking, viruses and sniffing. However most threats in information technology systems come within, whereby threats come... more
    • by 
    •   5  
      EngineeringNetwork SecurityComputer SecurityHacker
This paper discusses the development of new hardware and software for protecting access to HMI/SCADA systems via Unprotected Internet Networks (UPN), mainly when working remotely with confidential information. Based on the analysis... more
    • by 
    •   10  
      Cognitive ScienceComputer ScienceComputer SecurityMedicine
As educational institutions embrace digital transformation, the integration of technology in educational management has introduced both opportunities and challenges. One of the most pressing challenges is ensuring cyber security. This... more
    • by 
    • Cyber Security
Internet security is a big problem. Several approaches have been suggested to deal with the problem, ranging from technological, to law-based, to economics-based solutions. One approach emerging is the notion of self-help – using... more
    • by 
    • by 
    •   5  
      Science fictional technologyEconomics of R&D and innovationHackerScience Fiction Studies
Vì sao bà bầu bị chảy máu mũi, mẹ nên làm gì khi bị chảy máu mũi,… là điều nhiều mẹ đặc biệt quan tâm bởi chảy máu mũi khi mang thai là tình trạng khá phổ biến trong thai kỳ.
    • by 
    •   5  
      Bà BầuCẩm Nang Bà BầuChăm Sóc Sức KhỏeThực Phẩm Cho Bà Bầu
    • by 
    •   8  
      CriminologyPsychologySocial learningHacker
    • by 
    •   6  
      Computer ScienceArtificial IntelligenceComputer VisionMusic and identity
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi... more
    • by 
    •   4  
      BusinessHackerCybercrimeSTOCK EXCHANGE
    • by 
    •   8  
      BusinessHackerSocial Science Research NetworkInsider Trading
Chị em khi mang thai cần nắm được cách chống chuột rút cho bà bầu nhanh chóng và hiệu quả nhằm giảm đau nhanh chóng từ đó giúp mẹ khỏe và bé yêu được phát triển khỏe mạnh.
    • by 
    •   5  
      Bà BầuCẩm Nang Bà BầuChăm Sóc Sức KhỏeThực Phẩm Cho Bà Bầu
    • by 
    •   6  
      Computer ScienceComputer SecurityHackerLibrary and Information Studies
    • by 
    •   15  
      EngineeringInternational LawPolitical ScienceInformation Warfare
    • by 
    •   12  
      EngineeringComputer SciencePrivacyComputer Security
    • by 
    • Hacker
    • by 
    •   6  
      EngineeringComputer ScienceComputer SecurityHacker
    • by 
    •   5  
      Computer ScienceKnowledge sharingHackerWorld Wide Web
    • by 
    •   5  
      Information SystemsComputer ScienceComputer SecurityCyberspace
With the increasing significance of startups recently, practitioners and academicians have considered the growth hacking strategies by which these firms obtain competitive performance gains and bring into the world economy. So far,... more
    • by 
    •   4  
      BusinessTypologyHackerRevenue
    • by 
    •   4  
      Computer ScienceSurpriseComputer SecurityHacker
Several security tools have been described in recent times to assist security teams; however, the effectiveness and success remain limited to specific devices. Phishing is a type of cyberattack that uses fraudulent emails and websites to... more
    • by 
    •   12  
      Computer ScienceDistributed ComputingWireless Sensor NetworksComputer Security
Security of data is the major concern in today’s scenario. Transferring of data from one source point to a destination point is referred as data transfer. Encryption is one of the methods which is widely used for transfer of information... more
    • by 
    •   6  
      Computer ScienceHealth SciencesComputer SecurityCryptography
The primary purpose of social media was to facilitate communication between long-lost acquaintances and enable the exchange of personal thoughts, ideas, and insights. On the contrary, with the proliferation of social media users, a... more
    • by 
    •   3  
      Forensic ScienceDigital Forensics and Cyber InvestigationSocial Media Forensics
Over the last few years, there is tremendous use of online social networking sites. It’s also providing opportunities for hackers to enter easily in network and do their unauthorized activities. There are many notable social networking... more
    • by 
    •   9  
      EngineeringComputer ScienceSocial MediaHacker
    • by 
    •   6  
      SociologyComputer ScienceComputer SecurityHacker
The idea and perception of good cyber security protection remains at the forefront of many organizations’ information and communication technology strategy and investment. However, delving deeper into the details of its implementation... more
    • by 
    •   4  
      Computer ScienceComputer SecurityFuture InternetHacker
    • by 
    •   6  
      SociologyComputer ScienceComputer SecurityHacker
    • by 
    •   12  
      BusinessComputer ScienceInformation SecurityComputer Security
Theo chia sẻ của các mẹ bầu đi trước uống nước dừa trong thai kỳ mang lại nhiều lời ích về sức khỏe cho mẹ và em bé. Tuy nhiên nhiều chị em băn khoăn giai đoạn nào uống nước dừa tốt nhất, thai 20 tuần uống nước dừa được chưa?
    • by 
    •   5  
      Bà BầuCẩm Nang Bà BầuChăm Sóc Sức KhỏeThực Phẩm Cho Bà Bầu
Seit mehr als zwei Jahrzehnten beschäftigt sich der Berliner Medien-und Konzeptkünstler Aram Bartholl mit den gesellschaftlichen Folgen von Digitalisierung und Internet. Dabei hat er sich nie auf ein Medium festlegen lassen: Mit Drucken,... more
    • by 
    •   15  
      Experimental Media ArtsMedia ArtsComputer ArtsInternet Art
Smart phone usage and various computer applications has become part and parcel of daily life of millions of individuals in India and across the globe.These apps help in doing day to day tasks in an efficient manner,it saves time and they... more
    • by 
    •   8  
      Computer SciencePerceptionInformation SecurityComputer Security
    • by 
    •   15  
      EngineeringComputer ScienceRequirements EngineeringDatabase Systems
    • by 
    •   6  
      Political ScienceComputer SecurityCyberspaceHacker
    • by 
    •   5  
      Computer ScienceThe InternetAnomaly DetectionHacker