Buscar
Mostrando ítems 1-7 de 7
A Benefit Dependency Network for Shadow Information Technology Adoption, Based on Practitioners’ Viewpoints
(MDPI, 2022)
Acceso abierto
Shadow information technology (SIT) revolves around systems that are hidden but are
still managed by the same business entities. It consists of the use of devices, software, systems
and applications without the information ...
Phishing video game to validate the principles of persuasion in university students
(Association for Information Systems, 2021)
Acceso restringido
Phishing is a social engineering procedure in which a malicious actor impersonates a trusted third party with the intention of tricking the user into disclosing confidential information. Research on social engineering has ...
Systematic mapping of the literature on Secure Software Development
(IEEE, 2021)
Acceso abierto
The accelerated growth in exploiting vulnerabilities due to errors or failures in the software development process is a latent concern in the Software Industry. In this sense, this study aims to provide an overview of the ...
Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics
(Multidisciplinary Digital Publishing Institute (MDPI), 2020)
Acceso abierto
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide heterogeneity of endpoint devices at the Edge of the emerging communication environments for enabling the malicious enforcement of fraud ...
A Comparison of Authentication Methods via Keystroke Dynamics
(IEEE, 2020)
Acceso restringido
Authentication systems based on keystroke dynamics analyze the typical typing pattern of a user when interacting with an input device, such as the keyboard of a computer. In the literature, three major approaches on keystroke ...
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
(NLM (Medline), 2020)
Acceso abierto
In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders ...
EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats
(Elsevier, 2020)
Acceso restringido
The emergent communication technologies landscape has consolidated the anomaly-based intrusion detection paradigm as one of the most prominent solutions able to discover unprecedented malicious traits. It relied on building ...