ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Computing
Industrial engineer
Architecture and Urbanism
Biology
Pure sciences
Chemical engineering
Computing
Law
Education
all records (15)

Languages
English

Countries
Brazil
Canada
USA
Turkey, Turkish Republic
Austria
Croatia
State of palestine
Malaysia
Romania

Years
2021
2020
2019
2018
2017
2016

Filter  
 
15  Articles
1 of 3 pages  |  10  records  |  more records»
In today's world that called technology age, smartphones have become indispensable for users in many areas such as internet usage, social media usage, bank transactions, e-mail, as well as communication. The Android operating system is the most popular op... see more

Enterprise network (EN) supports thousands of users, and interconnects many networks. EN integrates different operating systems and hosts hundreds of servers that provide several services such as web applications, databases, E-mail, and others. Security t... see more

The open source nature of Android Operating System has attracted wider adoption of the system by multiple types of developers. This phenomenon has further fostered an exponential proliferation of devices running the Android OS into different sectors of th... see more

Cloud Computing strives to be dynamic as a service oriented architecture. The services in the SoA are rendered in terms of private, public and in many other commercial domain aspects. These services should be secured and thus are very vital to the cloud i... see more

O Código de Processo Penal italiano não contém qualquer disciplina sobre a investigação efetuada com o auxílio de malwares de tipo “cavalo de Troia” instalados em um dispositivo eletrônico como um smartphone ou um tablet. Este artigo explica em quais caso... see more

The purpose of this paper is analyzing maliciousattacks in computer networks and the Internet. Dionaea honeypotis deployed on cloud environment to detect and collect malwareattacks by reporting the malwares to external analysis serviceproviders in order t... see more

Internet users all over the world are highly exposed to social media exploitation, where they are vulnerable to be targeted by this cyber-attack. Furthermore, excessive use of social media leads to Internet Addiction Disorder (IAD). Fortunately, social me... see more

Currently, cloud computing is facing different types of threats whether from inside or outside its environment.  This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique... see more

Malwares are increasing rapidly. The nature of distribution and effects of malwares attacking several applications requires a real-time response. Therefore, a high performance detection platform is required. In this paper, Hadoop is utilized to perform st... see more

1 of 3 pages  |  10  records  |  more records»