Open Source Intelligence Opportunities and Challenges–A Review

S Szymoniak, K Foks - Advances in Science and Technology …, 2024 - yadda.icm.edu.pl
Data files, photos, and videos on the internet are vast sources of information about the
person who posted them. These files contain content about appearance, behaviour, views …

Combining security and reliability of critical infrastructures: The concept of securability

L Maglaras, H Janicke, MA Ferrag - Applied Sciences, 2022 - mdpi.com
The digital revolution has made people more dependent on ICT technology to perform
everyday tasks, whether at home or at work. The systems that support critical aspects of this …

Network security node-edge scoring system using attack graph based on vulnerability correlation

GY Shin, SS Hong, JS Lee, IS Han, HK Kim, HR Oh - Applied Sciences, 2022 - mdpi.com
As network technology has advanced, and as larger and larger quantities of data are being
collected, networks are becoming increasingly complex. Various vulnerabilities are being …

Application-aware flow forwarding service for sdn-based data centers

JE Lozano-Rizk, JE Gonzalez-Trejo… - Electronics, 2022 - mdpi.com
Security and Quality of Service (QoS) in communication networks are critical factors
supporting end-to-end dataflows in data centers. On the other hand, it is essential to provide …

Factores de riesgo, amenazas, vulnerabilidades y defensa en aplicaciones web turisticas

PA Quezada-Sarmiento… - Revista Ibérica de …, 2023 - search.proquest.com
Mencionando ejemplos de incidentes de seguridad en aplicaciones web que recientemente
generaron algún tipo de afectación en cuanto a disponibilidad, confidencialidad …

Uncovering the Risk of Academic Information System Vulnerability through PTES and OWASP Method

FP Utama, RMH Nurhadi - CommIT (Communication and …, 2024 - journal.binus.ac.id
The security of academic information systems needs consideration to anticipate various
threats, resulting in data leakage, misuse of information, modification, and data destruction …

[PDF][PDF] API Security Testing: The Challenges of Security Testing for Restful APIs

SJ Alharbi, T Moulahi - 2023 - researchgate.net
Modern web applications and software systems have shifted to relying on RESTful APIs,
which are more susceptible to security threats such as injection attacks, authentication …

Context and Characteristics of Software Related to Ecuadorian Scientific Production: A Bibliometric and Content Analysis Study

M Espinoza-Mina, A Colina Vargas… - … Conference on Applied …, 2023 - Springer
In view of the predominance of Information Technologies in different contexts, it is known
that the use of software and data in the field of scientific research has increased; however, it …

[PDF][PDF] Securability

L Maglaras, H Janicke, M Ferrag - Sensors, 2021 - researchgate.net
Digital revolution has made people more dependent on ICT technology to perform everyday
tasks either at home or at work. The systems that support critical aspects of this smart way of …

[PDF][PDF] Simplifying Vulnerability-Scan Results

T Kosacki - 2023 - opus.htwg-konstanz.de
This thesis emphasizes problems that reports generated by vulnerability scanners impose
on the process of vulnerability management, which are a. an overwhelming amount of data …