Search results for: CYBERSECURITY - Bridge of Knowledge

Search

Search results for: CYBERSECURITY

Search results for: CYBERSECURITY

  • Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

    Publication
    • A. G. Akintola
    • A. O. Balogun
    • L. F. Capretz
    • H. A. Mojeed
    • S. Basri
    • S. A. Salihu
    • F. E. Usman-Hamza
    • P. O. Sadiku
    • G. B. Balogun
    • Z. O. Alanamu

    - Applied Sciences-Basel - Year 2022

    As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...

    Full text available to download

  • OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

    Publication
    • S. S. Narayana Chintapalli
    • S. Prakash Singh
    • J. Frnda
    • B. P. Divakarachar
    • V. L. Sarraju
    • P. Falkowski-Gilski

    - Heliyon - Year 2024

    Currently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...

    Full text available to download

  • Silent Signals The Covert Network Shaping the Future

    Publication

    - Year 2007

    Silent Signals The Covert Network Shaping the Future In a world dominated by information flow and rapid technological advancements, the existence of hidden networks and unseen influences has never been more relevant. "Silent Signals: The Covert Network Shaping the Future" delves deep into the mysterious and often opaque world of covert communication networks. This influential work sheds light on the silent...

    Full text available to download

  • KONFIGURACJA FIREWALLI CISCO ASA W PROGRAMIE PACKET TRACER

    Publication

    - Year 2020

    Full text to download in external service

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Full text available to download

  • Klaudia Skelnik dr

    People

    dr Klaudia Skelnik Prodziekan Wydziału Prawa i Administracji Wyższa Szkoła Bankowa w Gdańsku, doktor nauk społecznych w dyscyplinie nauki o bezpieczeństwie, absolwent studiów MBA zarządzanie bezpieczeństwem, mgr politologii w specjalizacji ustrojowo-samorządowej, posiadająca podyplomowe wykształcenie wyższe w zakresie prawa Unii Europejskiej, Edukacji dla bezpieczeństwa, Bezpieczeństwa i Higiena Pracy oraz szereg kursów i szkoleń...

  • Damian Strojek

    People

  • DEWI Dependable Embedded Wireless Infrastructure

    Projects

    Project manager: dr hab. inż. Łukasz Kulas   Financial Program Name: ARTEMIS

    Project realized in Department of Microwave and Antenna Engineering according to 621353 agreement from 2014-10-22