A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems
[article]
2019
arXiv
pre-print
In this work, we propose Orpheus, a new security methodology for defending against data-oriented attacks by enforcing cyber-physical execution semantics. ...
Securing cyber-physical systems (CPS) against malicious attacks is of paramount importance because these attacks may cause irreparable damages to physical systems. ...
Mohammed,
bedded systems software,” in CCS, 2016. and S. A. Zonouz, “Hey, My Malware Knows Physics! Attacking PLCs
[8] D. ...
arXiv:1805.00074v2
fatcat:x5dmz45xorgwdblfwdoqrpxiiy
An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities
[article]
2022
arXiv
pre-print
The most critical infrastructures in this city are interconnected. ...
This study aims to present an overview of cyber threats, attacks, and countermeasures on the primary domains of smart cities (smart government, smart mobility, smart environment, smart living, smart healthcare ...
In addition, this research [55] looks at the security of railway control equipment against cyber or physical attacks. ...
arXiv:2207.04424v1
fatcat:wx23xb3mlfhajl6ualljthqdsy
Cryptojacking: Definition, Implementation, Effects and Protection Against That Form of Cyberattack. Is Malicious Cryptomining a Manifestation of the Crisis Behaviour of Individual Miners During Cryptocurrency Rush?
[chapter]
2023
Reactions of Market Entities to Crisis Situations
Increasing users' awareness of online security threats, including phishing, "forced" hackers to increase the level of advancement of such an attack. ...
This can be explained as a network of physical objects that are equipped with sensors, special software and other technological solutions enabling connection, data exchange with other devices and systems ...
doi:10.15611/2023.96.1.05
fatcat:gtjv2kgvlreczbbbomtfsspbje
A Primer on the Factories of the Future
2022
Sensors
Due to a lack of consensus on general nomenclature, the term Factory of the Future (or Future Factory) has been used in this paper as a collective euphemism for these paradigms. ...
Three advanced communication technologies capable of advancing the goals of the Factory of the Future and rapidly scaling advancements in the field are discussed. ...
Some of the images in this paper were designed using resources from Flaticon.com.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s22155834
pmid:35957390
pmcid:PMC9370931
fatcat:4gbvuy2yorddfp4j35okzvmlye
Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering
[article]
2018
arXiv
pre-print
We suggest that an ATD attack could change the sentiment of text in a web browser. This could alter the victim's perception of reality by providing disinformation. ...
We call this attack Ambient Tactical Deception (ATD). Ambient, in artificial intelligence, describes software that is "unobtrusive," and completely integrated into a user's life. ...
What my computer cannot do itself, it can do when networked to similar devices, some of which are networked to physical devices, environments, communications networks, broadcast networks, military installations ...
arXiv:1810.11063v1
fatcat:s4sxfp33hrc65o7ayk3ezu6b2e
Healthcare
[article]
2017
arXiv
pre-print
We will need data curation, pattern analysis, non-obvious relations, chemistry, engineering, computer science, nanotechnology, telecommunications, software, system of systems and medical cyber physical ...
In most environments, physical objects -the medical devices -are likely to be mixed and matched in an ad hoc fashion to serve the patient (dynamic system composition). ...
arXiv:1703.04524v1
fatcat:4a5mbp4scvgufpzb5utorx7r5i
Law and technologyThe end of the generative internet
2009
Communications of the ACM
Are you sure you want to run this software?" Users in many situations will not know how to answer this question reasonably. ...
The organization began documenting the number of attacks against Internet-connected systems -called "incidents" -at its founding in 1988. ...
doi:10.1145/1435417.1435426
fatcat:w6dqs7h3grdkzbwtbeisricp5i
Disappear here: violence after Generation X
2015
ChoiceReviews
Though the song is not identified in the novel, Baelo-Allué suggests that Clay is referring to "Los Angeles" from the 1980 album by the punk rock band X (60). ...
We know everything about you. We process your insurance claims and credit card charges. We control every part of your life . Together we ...
In the same manner that a hacker will take control over a system, The Mentor appropriates this denigration, essentially "hacking" language. ...
doi:10.5860/choice.194366
fatcat:3lgcnbvj4ng53hhqvrf3lje2ny
SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents
2017
Journal of Cyber Security and Mobility
By using proactive approaches such as a multi-agent system, agents can monitor certain environments and report abnormal behaviour in order to protect user data. ...
by SMS botnet attacks. ...
This system will detect SMS botnets and identify ways to block the attacks in order to prevent damage caused by these attacks. ...
doi:10.13052/jcsm2245-1439.523
fatcat:dkxeklymibgldpjr5fb6oebo3y
Click Fraud in Digital Advertising: A Comprehensive Survey
2021
Computers
In this article, we present a comprehensive study on the usage and impact of bots in performing click fraud in the realm of digital advertising. ...
Recent research has revealed an alarming prevalence of click fraud in online advertising systems. ...
Data Availability Statement: The data presented in this study are available in article.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/computers10120164
fatcat:hdq6jrmwcbgyzh5rqxcpfw4n6m
A Judge's Perspective: Online Hearings, especially the Gathering and Assessment of Evidence
[chapter]
2022
Online Dispute Resolution
Admitted to the Portuguese Bar (Ordem dos Advogados) in 1987. Has participated as arbitrator, counsel and expert in numerous domestic and international arbitrations. ...
Member of the ICSID panels of arbitrators and conciliators and of the arbitration rosters of several arbitration centres in Angola, Brazil, Cape Verde, Mozambique and Portugal. ...
Accordingly, cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. ...
doi:10.5771/9783748931508-87
fatcat:n6mstkeyp5gbnjvcvic6jo365a
A Lawyer's Perspective: Guarantees of a Fair Trial and Online Dispute Resolution
[chapter]
2022
Online Dispute Resolution
Admitted to the Portuguese Bar (Ordem dos Advogados) in 1987. Has participated as arbitrator, counsel and expert in numerous domestic and international arbitrations. ...
Member of the ICSID panels of arbitrators and conciliators and of the arbitration rosters of several arbitration centres in Angola, Brazil, Cape Verde, Mozambique and Portugal. ...
Accordingly, cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. ...
doi:10.5771/9783748931508-59
fatcat:fjyw2kzltnbazd4wsvh5akosum
An Arbitrator's Perspective: Online hearings in Arbitration: the taking of Evidence
[chapter]
2022
Online Dispute Resolution
Admitted to the Portuguese Bar (Ordem dos Advogados) in 1987. Has participated as arbitrator, counsel and expert in numerous domestic and international arbitrations. ...
Member of the ICSID panels of arbitrators and conciliators and of the arbitration rosters of several arbitration centres in Angola, Brazil, Cape Verde, Mozambique and Portugal. ...
Accordingly, cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. ...
doi:10.5771/9783748931508-107
fatcat:qr4zurymyjh2rlueprlapbfyjq
An Arbitration Center's Perspective: Online Dispute Resolution and the Virtual Hearings: Six Characters in Search of an Author
[chapter]
2022
Online Dispute Resolution
Admitted to the Portuguese Bar (Ordem dos Advogados) in 1987. Has participated as arbitrator, counsel and expert in numerous domestic and international arbitrations. ...
Member of the ICSID panels of arbitrators and conciliators and of the arbitration rosters of several arbitration centres in Angola, Brazil, Cape Verde, Mozambique and Portugal. ...
Accordingly, cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. ...
doi:10.5771/9783748931508-145
fatcat:ihrphczhkrd2ricjwpl4qzjffu
The dying dreamer: architecture of parallel realities
2003
Technoetic Arts
The main representative of this kind of architectural activity (the fictional character Baron des Esseintes in Joris-Karl Huysmans´ novel À Rebours from 1884) appears in all three articles. ...
experience, both physical and virtual. ...
Katja Grillner for generously supporting this work with ideas and criticism, and for being such a brilliant source of both knowledge and energy. ...
doi:10.1386/tear.1.1.61/0
fatcat:xugesaswbndnppnyd6m332d3ne
« Previous
Showing results 1 — 15 out of 60 results