Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to... more
    • by 
    •   6  
      Computer ScienceSocial EngineeringPhishingSecurity Risks
    • by 
    •   13  
      BusinessTransportation EngineeringComputer ScienceSoftware Engineering
    • by 
    •   12  
      Mechanical EngineeringComputer ScienceSecuritySecurity Requirements
A short paper on the affects Geoffrey Prime [a Russian spy] had on the modern intelligence society in Britain.
    • by 
    •   4  
      IntelligenceNational SecurityGeoffrey PrmeSecurity Risks
The current Covid-19 pandemic has benefited digital payment platforms. This digitalization resulted in ease of doing transactions and protection from virus and germs but while increasing usage of digital payments, it has led to a serious... more
    • by 
    •   6  
      Data PrivacyMobile PaymentsGeneration YSecurity Risks
    • by  and +1
    •   4  
      Network AnalysisReverse EngineeringSecurity RisksCommunication Protocol
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to... more
    • by  and +1
    •   4  
      Social EngineeringPhishingSecurity RisksCross Site Scripting
The growth in online transactions is accompanied with an increase in the incidences of fraud. In the online marketplace, fraudsters are using sophisticated malware to take over accounts and commit fraud related activities. At the global... more
    • by 
    •   6  
      Security MeasuresSecurity RisksInternet FraudE Commerce
    • by 
    •   11  
      ChemistryBiological WeaponsChemical WeaponsHuman Security
Inherent in any organization are security risks and barriers that must be understood, analyzed, and minimized in order to prepare for and perpetuate future growth and return on investment within the business. Likewise, company leaders... more
    • by 
    •   13  
      Mechanical EngineeringSecuritySecurity RequirementsEngineering and Computer Science
In this work an analysis of the sandbox features offered by Comodo Internet security was performed. The features such as Virtual Desktop as well as running the browser in a sandboxed environment were reviewed and tested by means of a... more
    • by 
    •   30  
      Computer ScienceComputer Security And ReliabilityInformation SecurityVirtual Environments
Intrusion detection systems are deployed on hosts in a computing infrastructure to tackle undesired events in the course of usage of the systems. One of the promising domains of applying intrusion detection is the healthcare domain. A... more
    • by  and +1
    •   11  
      Data MiningUbiquitous ComputingAnomaly DetectionIntrusion Detection
    • by 
    •   4  
      Network SecurityCloud ComputingData IntegritySecurity Risks
    • by 
    •   12  
      Resource AllocationCryptographyQuality of ServiceIP networks
Impact of COVID-19 on law enforcement might be early to assess before the pandemic is over, but crime patterns have changed in all criminal areas. Huge amount of people are working from home now, far from the comfort of up-to date... more
    • by 
    •   6  
      Social MediaSecurity RisksPublic Administration, Law Enforcement, TrainingCybercriminals
    • by 
    •   9  
      AssessmentElectronic VotingData AnalysisPolitics
This study attempted to examine the emerging security risks brought about by the e-hail taxi mode of transportation. It argues that despite the fact that the security risks associated with traditional taxi transportation still apply to... more
    • by 
    •   12  
      Transportation EngineeringComputer ScienceSoftware EngineeringInformation Technology
    • by 
    •   13  
      Worst-Case Execution Time AnalysisRisk AnalysisTelecommunication NetworksPerformance Evaluation
Inherent in any organization are security risks and barriers that must be understood, analyzed, and minimized in order to prepare for and perpetuate future growth and return on investment within the business. Likewise, company leaders... more
    • by 
    •   11  
      Mechanical EngineeringSecuritySecurity RequirementsEngineering and Computer Science
This study attempted to examine the emerging security risks brought about by the e-hail taxi mode of transportation. It argues that despite the fact that the security risks associated with traditional taxi transportation still apply to... more
    • by 
    •   6  
      Transportation EngineeringInformation TechnologyCollaborative LearningÜbersetzung
ABTRACT Wireless Sensor Network (WSN) has become an emerging technology of wireless communication and computing. Wireless Sensor Network is a self-configured, infrastructure-less wireless network which comprises of a few to large number... more
    • by 
    •   5  
      AuthenticityKey ManagementConfidentialitySecurity Risks
    • by 
    •   8  
      Network SecurityHealth CareAccess ControlVirtual Machine