-
1
Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms
Published 2024-09-01“…Spoofing has been studied as a new type of cyberattack, where masquerading as a legal object (computer, device or network) is used by hackers as a means of penetrating other computer networks. …”
Get full text
Article -
2
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01“…Identification of attack is a way to identify the security violations and analyze the measures in a computer network. …”
Get full text
Article -
3
Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)
Published 2024-01-01“…In a public channel, IoMTS must ensure information security for protection against hacker attacks. Hence, in this study, a symmetric encryption and decryption protocol was designed to ensure infosecurity of biosignals and medical images and assist in specific purposes in disease diagnosis. …”
Get full text
Article -
4
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01Get full text
Article -
5
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01Get full text
Article -
6
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01Get full text
Article -
7
Framework to analyze and exploit the smart home IoT firmware
Published 2025-02-01Get full text
Article -
8
-
9
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Published 2021-01-01“…However, it is essential to note that this convenience comes with a price that involves security vulnerabilities as IoT networks are prone to be interfered with by hackers who can access the sensor/communication data and later utilize it for malicious purposes. …”
Get full text
Article