scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "INTERNET security"

1 - 10 of 81,772 results for
 "INTERNET security"
Results per page:

Trust-Based Certificateless Privacy-Preserving Authentication in Internet of Vehicles.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 8/18/2022, p1-15. 15p.

Abstract:Owing to the security requirements of Internet of vehicles (IOV), it is necessary to design a secure privacy-preserving scheme for communication. Traditional privacy-preserving schemes have two deficiencies. One is the high cost of computation and comm...

View details

CROSS-LINGUAL CYBERSECURITY ANALYTICS IN THE INTERNATIONAL DARK WEB WITH ADVERSARIAL DEEP REPRESENTATION LEARNING.

Publication Type:Academic Journal

Source(s):MIS Quarterly. Jun2022, Vol. 46 Issue 2, p1209-1226. 18p. 3 Diagrams, 4 Charts, 4 Graphs.

Abstract:International dark web platforms operating within multiple geopolitical regions and languages host a myriad of hacker assets such as malware, hacking tools, hacking tutorials, and malicious source code. Cybersecurity analytics organizations employ mach...

View details

Secure Data Deduplication System with Cyber Security Multikey Management in Cloud Storage.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 8/12/2022, p1-11. 11p.

Abstract:Object detection is essential in a video surveillance system. To recognize an item in a movie, we first examine each picture pixel by pixel. The Secure Data Deduplication system in segmentation is the process of separating distinct picture components i...

View details

Optimized Artificial Neural Network Techniques to Improve Cybersecurity of Higher Education Institution.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 72 Issue 2, p3385-3399. 15p.

Abstract:Education acts as an important part of economic growth and improvement in human welfare. The educational sectors have transformed a lot in recent days, and Information and Communication Technology (ICT) is an effective part of the education field. Almo...

View details

Metaheuristic Lightweight Cryptography for Security Enhancement in Internet of Things.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 72 Issue 2, p3009-3023. 15p.

Abstract:The advancements made in Internet of Things (IoT) is projected to alter the functioning of healthcare industry in addition to increased penetration of different applications. However, data security and private are challenging tasks to accomplish in IoT...

View details

Hidden Malware Ratchets Up Cybersecurity Risks: Cybercriminals could be hiding malware payloads in places where commercial cybersecurity software is unable to detect it.

Publication Type:Periodical

Source(s):Communications of the ACM. Oct2022, Vol. 65 Issue 10, p16-18. 3p. 1 Color Photograph.

Abstract:The article discusses the cybersecurity risks that are associated with malware that is not detectable by traditional commercial anti-malware security software programs, and it mentions how cybercriminals have been known to hide malware infections in au...

View details

Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 7/9/2022, p1-13. 13p.

Abstract:In the last decade, huge growth is recorded globally in computer networks and Internet of Things (IoT) networks due to the exponential data generation, approximately zettabyte to a petabyte. Consequently, security issues have also been arisen with the ...

View details

Security by Labeling: Protecting and empowering the digital consumer.

Publication Type:Periodical

Source(s):Communications of the ACM. Sep2022, Vol. 65 Issue 9, p23-25. 3p. 1 Color Photograph.

Abstract:This article presents the concept of cybersecurity of Internet of Things (IoT) devices and how consumers need to be better educated and informed about them. Topics include how to convene understandable information to consumers, labels on devices commun...

View details

Cybersecurity as Illuminator for the Future of Computing Research: Considering the shifting fundamentals of cybersecurity research.

Publication Type:Periodical

Source(s):Communications of the ACM. May2022, Vol. 65 Issue 5, p39-41. 4p. 1 Illustration.

Abstract:The article discusses cybersecurity as an indicator for computing research. According to the article, cybersecurity and cybersecurity research in the early 21st century involves several challenges including computing as a fundamental aspect of society ...

View details

A SURVEY ON EFFECTIVE MACHINE LEARNING TECHNIQUES IN THE FIELD OF CYBER SECURITY.

Publication Type:Academic Journal

Source(s):International Journal of Advanced Research in Computer Science. Jul/Aug2022, Vol. 13 Issue 4, p56-61. 6p.

Abstract:Machine learning techniques have many cybersecurity applications, and they have entered the mainstream in a variety of fields. Examples include threat analysis, anomaly-based intrusion detection of frequent attacks on important infrastructures, malware...

View details

banner_970x250 (970x250)

sponsored