Category: Cyber
Home Research
Daan Vanoverloop, Andrés Sánchez, Victor Bullynck, Flavio Toffalini, Frank Piessens, Mathias Payer, Jo Van Bulck
Talk: Blurring Enclave Page Accesses in Space and Time with Compile-Time Instrumentation
Cyber

This talk overviews our recent work on TLBlur, a novel approach that leverages compiler instrumentation and the recent AEX-Notify hardware...

Review:

This talk outlines "TLBlur," a promising new approach to mitigating controlled-channel attacks against Intel SGX enclaves. The work leverages a novel...

View Full Research
GG Albuquerque
MACETAMENTO NO BEAT PEGA HACKER
Cyber

Este artigo apresenta uma proposta teórico-conceitual para investigar metodologias criativas e epistemologias sonoras de culturas de música eletrônica...

Review:

This article, "MACETAMENTO NO BEAT PEGA HACKER," introduces a compelling theoretical-conceptual framework aimed at investigating the creative methodol...

View Full Research
Muhammad Idris Abubakar, Ajayi Ore-Ofe, Abubakar Umar, Ibrahim Ibrahim, Lawal Abdulwahab Olugbenga, Ajikanle Abdulbasit Abiola
Design Of an Enterprise Network Terminal Security Solution
Cyber

This paper develops a secured enterprise network terminal security solution that seeks to safeguard the confidentiality, integrity, and availability o...

Review:

This paper, "Design Of an Enterprise Network Terminal Security Solution," addresses a highly pertinent and critical issue in contemporary network secu...

View Full Research
Moh Rizki Syaifudin, Mohamad Ali Murtadho, Moh Shohibul Wafa, Mukhamad Masrur
UNIPDU Campus Website Security Analysis Through Vulnerability Assessment (VA) Method with Acunetix Tools Assistance
Cyber

Amidst the rapid development of technology, website vulnerabilities are a major threat, opening up opportunities for hackers to hunt and st...

Review:

This paper addresses a highly relevant and critical topic: the security posture of the UNIPDU Jombang campus website. By employing a Vulnerability Ass...

View Full Research
Christian Alderi Jeffta Soewoeh, Edwin Tenda, Eliasta Ketaren, Wisard Widsli Kalengkongan, Mahardika Inra Takaendengan
ANALISA KERENTANAN WEBSITE FMIPA UNSRAT BERDASARKAN OPEN WEB APPLICATION SECURITY PROJECT TOP 10 FRAMEWORK
Cyber

Salah satu langkah preventif untuk meminimalisir dampak buruk serangan siber adalah dengan melakukan penilaian kerentanan yang hasilnya dapat dianalis...

Review:

This paper, titled "Vulnerability Analysis of FMIPA UNSRAT Website Based on Open Web Application Security Project Top 10 Framework," addresses a highl...

View Full Research
Yuliana, Rohmi Dyah Astuti, Ade Laelani, Linda Rassiyanti, Yusni Puspha Lestari, Ronal
Penerapan Metode Least Significant Bit untuk Penyembunyian Pesan Rahasia dalam Gambar dengan Optimasi Ukuran File
Cyber

Steganografi merupakan teknik untuk menyembunyikan pesan rahasia dalam media digital guna menjaga kerahasiaan informasi. Penelitian ini menerapkan met...

Review:

This paper presents a focused investigation into the application of the Least Significant Bit (LSB) method for embedding secret messages within graysc...

View Full Research
Gianluigi Fioriglio
Intelligenza artificiale e cibersicurezza: profili informatico-giuridici, fra vulnerabilità delle macchine e delle persone
Cyber

Il contributo discute le principali questioni di ciberiscurezza dei sistemi di Intelligenza Artificiale (IA) in una prospettiva informatico-giuridica....

Review:

The article, "Intelligenza artificiale e cibersicurezza: profili informatico-giuridici, fra vulnerabilità delle macchine e delle persone," addresses a...

View Full Research
Nisher Ahmed, Md Emran Hossain, Zakir Hossain, Md Farhad Kabir, Iffat Sania Hossain
AIPowered Trust and Security: Enhancing ECommerce with Blockchain and Machine Learning
Cyber

The ecommerce wave we saw over the years, not just added more opportunities, but added more challenges, especially in the area of trust and security....

Review:

The paper titled "AIPowered Trust and Security: Enhancing ECommerce with Blockchain and Machine Learning" addresses a highly pertinent and critical ch...

View Full Research
Mohadib Mohadib, Achmad Farid Widjdi, Azhar Fathoni, Saddam Rasyidin Al Faruq
Strengthening Cyber Resilience through IoBT Best Practices: Future Applications
Cyber

In today's digital era, Internet of Battlefield Things (IoBT) security has become particularly important in ensuring the success of military operation...

Review:

The paper, "Strengthening Cyber Resilience through IoBT Best Practices: Future Applications," addresses a highly relevant and critical area concerning...

View Full Research
Essam Natsheh, Fatima Bakhit Tabook
AI-enhanced Cybersecurity Risk Assessment with Multi-Fuzzy Inference
Cyber

The pace and complexity of modern cyber-attacks expose the limits of traditional ‘impact × likelihood’ risk matrices, which compress uncertainty into...

Review:

This paper introduces a timely and highly relevant solution to a critical challenge in modern cybersecurity: the inherent limitations of traditional,...

View Full Research

    Showing 11 to 20 of 20 results