Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

Database administration practical aspects in providing digitalization of educational services

P Petrov, I Kuyumdzhiev, R Malkawi… - … Journal of Emerging …, 2022 - learntechlib.org
When delivering digitalization of educational services, a specific administration plan should
be established, designed for maximum access, quick recovery from failure, and lowering the …

Raspberry pis for network security

AS Fetter, MM Chowdhury, S Latif - … Conference on Electrical …, 2021 - ieeexplore.ieee.org
Utilization of sandboxing is wide known within the computer security field. The main issue
many encounter in this sphere is how prohibitive the cost can be to emulate the network of …

Cyber Mission Operations: A Literature Review

R Winter, R Ruiz, F de Franco Rosa, M Jino - … International Conference on …, 2020 - Springer
Military commanders follow various principles of war aiming at reducing material and human
losses as well as maximizing the advantages in military missions. Military mission …

The Investigation of Logistic Regression Methods Applied to Engineering Education using Project Based Learning for Airport Systems Design

WL Brown, I Dabipi, D Sharma, L Zhang… - 2021 IEEE Frontiers …, 2021 - ieeexplore.ieee.org
This is a work in progress on the research-to-practice to advance engineering development
using logistic regression design methods in engineering education through project-based …

[PDF][PDF] Emulation and Detection of Cyber Threat Scenarios

Z Ahmad - is.muni.cz
This diploma thesis focuses on automating adversary cyber threat scenarios utilizing the
MITRE CALDERA tool, which is organized according to the kill chain model using the MITRE …

Emulation for Multiple Instruction Set Architectures

C Wright - 2021 - search.proquest.com
Abstract System emulation and firmware re-hosting are popular techniques to answer
various security and performance related questions, such as, does a firmware contain …

[PDF][PDF] Izrada i ispitivanje kibernetičkog poligona za uvježbavanje tehničkih sposobnosti

A Kandić - zemris.fer.hr
Ubrzani razvoj tehnologije doveo je do većeg broja napada i prijetnji na internetu. Kako je
broj napada postajao veći tako je rasla i potražnja za stručnjacima za kibernetičku sigurnost …

Diseño de red bayesiana para la predicción de ataques informáticos de tipo Ransomware. Caso de estudio PYMES prestadoras de servicios

FA Gómez Bautista, YA Rey Sepúlveda - 2019 - repository.unab.edu.co
Los ataques de Ransowmare los cuales tuvieron un auge de uso en nuestro Siglo XXI, es
método perfecto para secuestrar equipos y generar caos en una organización, en la vida de …

Diseño de Red Bayesiana para tomar decisiones proactivas frente a ataques de secuestro de datos dentro de Pymes prestadoras de servicios

YA Rey Sepulveda, FA Gomez Bautista - 2019 - repository.unab.edu.co
En este documento se detallan las indicaciones básicas a seguir para la presentación de
trabajos de investigación al VI Encuentro de Semilleros de Investigación UNAB. En este …