We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Defining Security Metrics

    How do you know how well you are doing, unless you have metrics to tell you? Metrics provide decision support in running an organization. When an...
    Chapter 2024
  2. Security Metrics and Authentication-based RouTing (SMART) Protocol for Vehicular IoT Networks

    Routing protocols, responsible for determining optimal paths, fall into two main categories: reactive and proactive protocols. In the realm of...

    Rakesh Kumar, Sunil K. Singh, ... Shashi Jawla in SN Computer Science
    Article 27 January 2024
  3. A security vulnerability predictor based on source code metrics

    Detecting security vulnerabilities in the source code of software systems is one of the most important challenges in the field of software security....

    Puya Pakshad, Alireza Shameli-Sendi, Behzad Khalaji Emamzadeh Abbasi in Journal of Computer Virology and Hacking Techniques
    Article 17 February 2023
  4. A systematic literature review of cyber-security data repositories and performance assessment metrics for semi-supervised learning

    In Machine Learning, the datasets used to build models are one of the main factors limiting what these models can achieve and how good their...

    Paul K. Mvula, Paula Branco, ... Herna L. Viktor in Discover Data
    Article Open access 06 April 2023
  5. Empowering Network Security through Advanced Analysis of Malware Samples: Leveraging System Metrics and Network Log Data for Informed Decision-Making

    In the never-ending battle against rising malware threats, cybersecurity professionals were constantly challenged by malware researchers. Businesses...

    Fares Alharbi, Gautam Siddharth Kashyap in International Journal of Networked and Distributed Computing
    Article Open access 11 June 2024
  6. Attack Graph Based Security Metrics for Dynamic Networks

    Evaluating network attack graphs in today’s dynamic networks poses a challenge. Conventional metrics used for attack graph based risk assessment are...
    Ayan Gain, Mridul Sankar Barik in Information Systems Security
    Conference paper 2023
  7. Security Metrics

    It has always been a struggle for information security professionals to measure “the effectiveness” of IT security controls. In the 1980s, “orange...
    Virgilio Viegas, Oben Kuyucu in IT Security Controls
    Chapter 2022
  8. Metrics of Software Security

    Guido Salvaneschi, Paolo Salvaneschi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2024
  9. Predicting software vulnerability based on software metrics: a deep learning approach

    The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems....

    Francis Kwadzo Agbenyegah, Micheal Asante, ... Ernest Akpaku in Iran Journal of Computer Science
    Article 05 June 2024
  10. Estimating vulnerability metrics with word embedding and multiclass classification methods

    Cyber security has an increasing importance since the day when information technologies are an invariable part of modern human life. One of the...

    Hakan Kekül, Burhan Ergen, Halil Arslan in International Journal of Information Security
    Article 11 August 2023
  11. A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics

    The goal of this research is to build a vulnerability prediction model to assist developers in evaluating the security of software systems during the...

    Kazi Zakia Sultana, Charles B. Boyd, Byron J. Williams in SN Computer Science
    Article 09 August 2023
  12. Security to text (S2T): multi-layered based security approaches for secret text content

    In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from...

    Shamal Kashid, Lalit K. Awasthi, Krishan Berwal in Multimedia Tools and Applications
    Article 19 June 2024
  13. Cloud data security for distributed embedded systems using machine learning and cryptography

    In the growing demand for distributed embedded systems that efficiently execute complex processes and high-end applications, safeguarding sensitive...

    Sadaf Bashir, Zahrah Ayub, M. Tariq Banday in International Journal of Information Technology
    Article 07 May 2024
  14. Social bot metrics

    In this paper, we propose metrics for malicious bots that provide a qualitative estimation of a bot type involved in the attack in social media: price ...

    Maxim Kolomeets, Andrey Chechulin in Social Network Analysis and Mining
    Article 22 February 2023
  15. Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain

    The recent expansion of the IoT ecosystem has not only significantly increased connectivity but also introduced new security challenges. To address...

    Ahsan Nazir, **gsha He, ... Muhammad Salman Pathan in Cluster Computing
    Article 10 April 2024
  16. A review on graph-based approaches for network security monitoring and botnet detection

    This survey paper provides a comprehensive overview of recent research and development in network security that uses graphs and graph-based data...

    Sofiane Lagraa, Martin Husák, ... Moussa Ouedraogo in International Journal of Information Security
    Article 30 August 2023
  17. Privacy and security federated reference architecture for Internet of Things

    Physical objects are getting connected to the Internet at an exceptional rate, making the idea of the Internet of Things (IoT) a reality. The IoT...

    Musab Kamal, Imran Rashid, ... Ijaz Ahmad in Frontiers of Information Technology & Electronic Engineering
    Article 01 April 2023
  18. Decoding the future: exploring and comparing ABE standards for cloud, IoT, blockchain security applications

    Data security poses a significant challenge in cloud computing, the Internet of Things (IoT), and blockchain applications. Attribute-Based Encryption...

    Kranthi Kumar Singamaneni, Kusum Yadav, ... Amandeep Kaur in Multimedia Tools and Applications
    Article 30 May 2024
  19. Machine learning and deep learning models for human activity recognition in security and surveillance: a review

    Human activity recognition (HAR) has received the significant attention in the field of security and surveillance due to its high potential for...

    Sheetal Waghchaware, Radhika Joshi in Knowledge and Information Systems
    Article 04 June 2024
  20. A blockchain-based security system with light cryptography for user authentication security

    Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology,...

    Imen Hagui, Amina Msolli, ... Fredj Hassen in Multimedia Tools and Applications
    Article 13 November 2023
Did you find what you were looking for? Share feedback.