Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Zeitgenössische IT-Sicherheit operiert in einer Überbietungslogik zwischen Sicherheitsvorkehrungen und Angriffsszenarien. Diese paranoid strukturierte Form negativer Sicherheit lässt sich vom Ursprung der IT-Sicherheit in der modernen Kryptografie über Computerviren und -würmer, Ransomware und Backdoors bis hin zum AIDS-Diskurs der 1980er Jahre nachzeichnen. Doch Sicherheit in und mit digital vernetzten Medien lässt sich auch anders denken: Marie-Luise Shnayien schlägt die Verwendung eines reparativen, queeren Sicherheitsbegriffs vor, dessen Praktiken zwar nicht auf der Ebene des Technischen angesiedelt sind, aber dennoch nicht ohne ein genaues Wissen desselben auskommen.
Computer viruses. --- Software viruses --- Viruses, Computer --- Computer crimes --- Malware (Computer software)
Choose an application
As increasingly sophisticated and evasive malware attacks continue to emerge, more effective detection solutions to tackle the problem are being sought through the application of advanced machine learning techniques. This reprint presents several advances in the field including: a new method of generating adversarial samples through byte sequence feature extraction using deep learning; a state-of-the-art comparative evaluation of deep learning approaches for mobile botnet detection; a novel visualization-based approach that utilizes images for Android botnet detection; a study on the detection of drive-by exploits in images using deep learning; etc. Furthermore, this reprint presents state-of-the-art reviews about machine learning-based detection techniques that will increase researchers' knowledge in the field and enable them to identify future research and development directions.
Malware (Computer software) --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software
Choose an application
The aims of the present study are to describe the modern forms of cybercrime and analyze the substantive computer-specific offenses of the Austrian Penal Code by the means of specialist literature and - as available - relevant judgments. Based on the debate about the terms “cybercrime” or “computer criminal law” and the term of data in the Austrian Penal Code, the specific substantive computer-specific offenses, including the penal provision of the Data Protection Code concerning the criminal protection of personal data, are presented and discussed systematically.
Computer crimes --- Denial of service attacks --- Phishing --- Cyberstalking --- Hacking --- Cyberterrorism --- Malware (Computer software) --- Internet pornography --- Internet fraud --- Law and legislation --- Austria. --- Cybercrime --- substantive criminal law --- malicious software --- denial of service-attacks --- hacking --- Cyber-bullying --- Computerkriminalität --- Computerstrafrecht --- Malware --- Datenbeschädigung --- Systemschädigungen --- Cyber-Mobbing --- Internet --- Tatbestand
Choose an application
As almost all human activities have been moved online due to the pandemic, novel robust and efficient approaches and further research have been in higher demand in the field of computer science and telecommunication. Therefore, this (reprint) book contains 13 high-quality papers presenting advancements in theoretical and practical aspects of computer recognition, pattern recognition, image processing and machine learning (shallow and deep), including, in particular, novel implementations of these techniques in the areas of modern telecommunications and cybersecurity.
Technology: general issues --- History of engineering & technology --- pointer instrumentation --- image processing --- object detection --- K-fold cross-validation --- Faster-RCNN --- vein detection --- digital image processing --- correlation --- displacement measurement --- semantic segmentation --- farmland vacancy segmentation --- strip pooling --- crop growth assessment --- encoder–decoder --- monotone curve --- tangent circle --- adjacent circle --- area of location of the curve --- contour --- fingerprinting --- malware analysis --- malicious network traffic analysis --- HTTP protocol analysis --- pcap file analysis --- malware tracking --- malware identification --- graph theory --- smart meter --- smart metering --- wireless sensor network --- interpolation --- tangent line --- curvature --- error --- ellipse --- B-spline --- dynamic dedicated path protection --- generic Dijkstra algorithm --- elastic optical network --- modulation constraints --- ECG signal --- classification --- PTB-XL --- deep learning --- computer vision --- adversarial attacks --- adversarial defences --- image quality assessment --- stitched images --- panoramic images --- image analysis --- image entropy --- NetFlow --- network intrusion detection --- network behavior analysis --- data quality --- feature selection --- fronthaul --- Xhaul --- DSB-RFoF --- A-RoF --- B5G --- 6G --- DIPP --- optical channel selection --- n/a --- encoder-decoder
Choose an application
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.
crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a
Choose an application
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.
cybersecurity --- critical Infrastructures --- privacy preservation --- risk management --- big data --- Internet of Things --- blockchain --- cyber threats --- cyber security and privacy policy --- hybrid war --- cybercrime --- COVID-19 pandemic --- coronavirus --- smart grids --- cyber security modeling and simulation --- cyber–physical systems --- industrial control systems --- network security and protocols --- cyber threat intelligence --- resiliency and security of cyber systems --- hardware security solutions --- intrusion detection --- secure communication protocols --- malware analysis --- attribution of cyber attacks --- simulation and test beds for security evaluation of critical infrastructures
Choose an application
The book Green, Energy-Efficient and Sustainable Networks provides insights and solutions for a range of problems in the field of obtaining greener, energy-efficient, and sustainable networks. The book contains the outcomes of the Special Issue on “Green, Energy-Efficient and Sustainable Networks” of the Sensors journal. Seventeen high-quality papers published in the Special Issue have been collected and reproduced in this book, demonstrating significant achievements in the field. Among the published papers, one paper is an editorial and one is a review, while the remaining 15 works are research articles. The published papers are self-contained peer-reviewed scientific works that are authored by more than 75 different contributors with both academic and industry backgrounds. The editorial paper gives an introduction to the problem of information and communication technology (ICT) energy consumption and greenhouse gas emissions, presenting the state of the art and future trends in terms of improving the energy-efficiency of wireless networks and data centers, as the major energy consumers in the ICT sector. In addition, the published articles aim to improve energy efficiency in the fields of software-defined networking, Internet of things, machine learning, authentication, energy harvesting, wireless relay systems, routing metrics, wireless sensor networks, device-to-device communications, heterogeneous wireless networks, and image sensing. The last paper is a review that gives a detailed overview of energy-efficiency improvements and methods for the implementation of fifth-generation networks and beyond. This book can serve as a source of information in industrial, teaching, and/or research and development activities. The book is a valuable source of information, since it presents recent advances in different fields related to greening and improving the energy-efficiency and sustainability of those ICTs particularly addressed in this book
node speed --- linear recovery --- resource block allocation --- social awareness --- internet-of-things --- scheduling algorithm --- renewables --- neural network --- battery capacity --- energy awareness --- measurement structure --- optimization --- energy efficiency --- charging efficiency --- random structural matrices --- SDN --- water filling algorithm --- ONOS --- energy harvesting --- malware detection --- node density --- HetNets --- sustainability --- cooperative smart community --- adversarial samples --- spatial modulation --- NOMA --- 5G --- light-weight authentication --- green networking --- Device-to-Device (D2D) --- lightweight cipher --- mobile edge computing --- wireless power transfer --- adaptive link rate --- successive interference cancellation (SIC) --- directional charging vehicle --- self-interference cancellation --- proportional rate constraint --- inter-meeting time --- sustainable --- RWSN --- channel state information --- stochastic geometry --- networks --- green internet of things (IoT) --- PHY-layer --- IoT --- Markov chain --- traffic engineering --- QoS --- energy-efficient Ethernet --- power --- lightweight authentication --- energy aware routing --- authentication --- wired access --- amplify-and-forward --- software defined networking (SDN) --- image compressive sensing (CS) --- green --- edge computing --- LTE-A --- opportunistic networks --- RF Fingerprinting --- data centre --- multiple-input multiple-output --- Internet of Things --- machine learning --- peer discovery --- full-duplex --- industrial --- carbon footprint --- WSN --- imperfect CSI --- data center --- symbol error probability --- physical-layer authentication --- interference coordination --- clustering --- control and data plane --- wireless --- ICT --- bisection based optimal power allocation --- energy-efficiency --- consumer preferences --- real-time traffic
Listing 1 - 7 of 7 |
Sort by
|