Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








60 Hits in 6.4 sec

Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems [article]

Long Cheng, Ke Tian, Danfeng Yao, Lui Sha, Raheem A. Beyah
2019 arXiv   pre-print
In this work, we propose Orpheus, a new security methodology for defending against data-oriented attacks by enforcing cyber-physical execution semantics.  ...  Securing cyber-physical systems (CPS) against malicious attacks is of paramount importance because these attacks may cause irreparable damages to physical systems.  ...  Mohammed, bedded systems software,” in CCS, 2016. and S. A. Zonouz, “Hey, My Malware Knows Physics! Attacking PLCs [8] D.  ... 
arXiv:1805.00074v2 fatcat:x5dmz45xorgwdblfwdoqrpxiiy

An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities [article]

Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis
2022 arXiv   pre-print
The most critical infrastructures in this city are interconnected.  ...  This study aims to present an overview of cyber threats, attacks, and countermeasures on the primary domains of smart cities (smart government, smart mobility, smart environment, smart living, smart healthcare  ...  In addition, this research [55] looks at the security of railway control equipment against cyber or physical attacks.  ... 
arXiv:2207.04424v1 fatcat:wx23xb3mlfhajl6ualljthqdsy

Cryptojacking: Definition, Implementation, Effects and Protection Against That Form of Cyberattack. Is Malicious Cryptomining a Manifestation of the Crisis Behaviour of Individual Miners During Cryptocurrency Rush? [chapter]

Tomasz Hetmańczuk
2023 Reactions of Market Entities to Crisis Situations  
Increasing users' awareness of online security threats, including phishing, "forced" hackers to increase the level of advancement of such an attack.  ...  This can be explained as a network of physical objects that are equipped with sensors, special software and other technological solutions enabling connection, data exchange with other devices and systems  ... 
doi:10.15611/2023.96.1.05 fatcat:gtjv2kgvlreczbbbomtfsspbje

A Primer on the Factories of the Future

Noble Anumbe, Clint Saidy, Ramy Harik
2022 Sensors  
Due to a lack of consensus on general nomenclature, the term Factory of the Future (or Future Factory) has been used in this paper as a collective euphemism for these paradigms.  ...  Three advanced communication technologies capable of advancing the goals of the Factory of the Future and rapidly scaling advancements in the field are discussed.  ...  Some of the images in this paper were designed using resources from Flaticon.com. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s22155834 pmid:35957390 pmcid:PMC9370931 fatcat:4gbvuy2yorddfp4j35okzvmlye

Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering [article]

Adam Trowbridge, Jessica Westbrook, Filipo Sharevski
2018 arXiv   pre-print
We suggest that an ATD attack could change the sentiment of text in a web browser. This could alter the victim's perception of reality by providing disinformation.  ...  We call this attack Ambient Tactical Deception (ATD). Ambient, in artificial intelligence, describes software that is "unobtrusive," and completely integrated into a user's life.  ...  What my computer cannot do itself, it can do when networked to similar devices, some of which are networked to physical devices, environments, communications networks, broadcast networks, military installations  ... 
arXiv:1810.11063v1 fatcat:s4sxfp33hrc65o7ayk3ezu6b2e

Healthcare [article]

Shoumen Palit Austin Datta, Julian M Goldman
2017 arXiv   pre-print
We will need data curation, pattern analysis, non-obvious relations, chemistry, engineering, computer science, nanotechnology, telecommunications, software, system of systems and medical cyber physical  ...  In most environments, physical objects -the medical devices -are likely to be mixed and matched in an ad hoc fashion to serve the patient (dynamic system composition).  ... 
arXiv:1703.04524v1 fatcat:4a5mbp4scvgufpzb5utorx7r5i

Law and technologyThe end of the generative internet

Jonathan Zittrain
2009 Communications of the ACM  
Are you sure you want to run this software?" Users in many situations will not know how to answer this question reasonably.  ...  The organization began documenting the number of attacks against Internet-connected systems -called "incidents" -at its founding in 1988.  ... 
doi:10.1145/1435417.1435426 fatcat:w6dqs7h3grdkzbwtbeisricp5i

Disappear here: violence after Generation X

2015 ChoiceReviews  
Though the song is not identified in the novel, Baelo-Allué suggests that Clay is referring to "Los Angeles" from the 1980 album by the punk rock band X (60).  ...  We know everything about you. We process your insurance claims and credit card charges. We control every part of your life . Together we  ...  In the same manner that a hacker will take control over a system, The Mentor appropriates this denigration, essentially "hacking" language.  ... 
doi:10.5860/choice.194366 fatcat:3lgcnbvj4ng53hhqvrf3lje2ny

SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents

Abdullah J. Alzahrani, Ali A. Ghorbani
2017 Journal of Cyber Security and Mobility  
By using proactive approaches such as a multi-agent system, agents can monitor certain environments and report abnormal behaviour in order to protect user data.  ...  by SMS botnet attacks.  ...  This system will detect SMS botnets and identify ways to block the attacks in order to prevent damage caused by these attacks.  ... 
doi:10.13052/jcsm2245-1439.523 fatcat:dkxeklymibgldpjr5fb6oebo3y

Click Fraud in Digital Advertising: A Comprehensive Survey

Shadi Sadeghpour, Natalija Vlajic
2021 Computers  
In this article, we present a comprehensive study on the usage and impact of bots in performing click fraud in the realm of digital advertising.  ...  Recent research has revealed an alarming prevalence of click fraud in online advertising systems.  ...  Data Availability Statement: The data presented in this study are available in article. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/computers10120164 fatcat:hdq6jrmwcbgyzh5rqxcpfw4n6m

A Judge's Perspective: Online Hearings, especially the Gathering and Assessment of Evidence [chapter]

Luís Filipe Pires de Sousa
2022 Online Dispute Resolution  
Admitted to the Portuguese Bar (Ordem dos Advogados) in 1987. Has participated as arbitrator, counsel and expert in numerous domestic and international arbitrations.  ...  Member of the ICSID panels of arbitrators and conciliators and of the arbitration rosters of several arbitration centres in Angola, Brazil, Cape Verde, Mozambique and Portugal.  ...  Accordingly, cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.  ... 
doi:10.5771/9783748931508-87 fatcat:n6mstkeyp5gbnjvcvic6jo365a

A Lawyer's Perspective: Guarantees of a Fair Trial and Online Dispute Resolution [chapter]

Nuno Ferreira Lousa
2022 Online Dispute Resolution  
Admitted to the Portuguese Bar (Ordem dos Advogados) in 1987. Has participated as arbitrator, counsel and expert in numerous domestic and international arbitrations.  ...  Member of the ICSID panels of arbitrators and conciliators and of the arbitration rosters of several arbitration centres in Angola, Brazil, Cape Verde, Mozambique and Portugal.  ...  Accordingly, cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.  ... 
doi:10.5771/9783748931508-59 fatcat:fjyw2kzltnbazd4wsvh5akosum

An Arbitrator's Perspective: Online hearings in Arbitration: the taking of Evidence [chapter]

Pilar Perales Viscasillas
2022 Online Dispute Resolution  
Admitted to the Portuguese Bar (Ordem dos Advogados) in 1987. Has participated as arbitrator, counsel and expert in numerous domestic and international arbitrations.  ...  Member of the ICSID panels of arbitrators and conciliators and of the arbitration rosters of several arbitration centres in Angola, Brazil, Cape Verde, Mozambique and Portugal.  ...  Accordingly, cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.  ... 
doi:10.5771/9783748931508-107 fatcat:qr4zurymyjh2rlueprlapbfyjq

An Arbitration Center's Perspective: Online Dispute Resolution and the Virtual Hearings: Six Characters in Search of an Author [chapter]

Paula Costa e Silva
2022 Online Dispute Resolution  
Admitted to the Portuguese Bar (Ordem dos Advogados) in 1987. Has participated as arbitrator, counsel and expert in numerous domestic and international arbitrations.  ...  Member of the ICSID panels of arbitrators and conciliators and of the arbitration rosters of several arbitration centres in Angola, Brazil, Cape Verde, Mozambique and Portugal.  ...  Accordingly, cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.  ... 
doi:10.5771/9783748931508-145 fatcat:ihrphczhkrd2ricjwpl4qzjffu

The dying dreamer: architecture of parallel realities

Malin Zimm
2003 Technoetic Arts  
The main representative of this kind of architectural activity (the fictional character Baron des Esseintes in Joris-Karl Huysmans´ novel À Rebours from 1884) appears in all three articles.  ...  experience, both physical and virtual.  ...  Katja Grillner for generously supporting this work with ideas and criticism, and for being such a brilliant source of both knowledge and energy.  ... 
doi:10.1386/tear.1.1.61/0 fatcat:xugesaswbndnppnyd6m332d3ne
« Previous Showing results 1 — 15 out of 60 results