When designing and implementing a new system, one of the most common misuse cases a system administrator or security architect anticipates is the fact that their system will be attacked with brute force and dictionary-based methods. These attack vectors are commonplace and as such, common defenses have been designed to help mitigate a successful attack. However, the common defenses employed are anticipated and mitigated by even the most novice of attackers. In order to better understand that nature and evolution of brute-force and dictionary attacks, research needs to evaluate the progression of the attack vectors as well as new variables to identify the risk of systems. The research that follows is designed to look at brute force and dicti...
Security attacks are becoming more prevalent as cyber attackers exploit system vulnerabilities for f...
The focus of this research revolves around Android platform security, specifically Android malware a...
In This paper the current security of various password hashing schemes that are in use today will be...
When designing and implementing a new system, one of the most common misuse cases a system administr...
In the present world, everyone uses the Internet and to access the internet they would need to use a...
SQL injection is one of several different types of code injection techniques used to attack data dri...
Most critical infrastructure depends on industrial control and automation systems to manage their pr...
There is a lack of consensus within the literature assessing whether surveillance is effective in re...
The future in how computing is done is heading in the direction of quantum computing given that the ...
Memory corruptions are a major part of security attacks observed nowadays. Many protection mechanis...
In order to support air traffic control services, the U.S. Federal Aviation Administration (FAA) has...
In our day-to-day life, web applications play an important role such as shopping, making financial t...
Analysis of The Typical Performance Routines for Recovering Data from Solid State Drive During a For...
Data de-duplication is a method used to compress information aiding in the removal of duplicate copi...
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for t...
Security attacks are becoming more prevalent as cyber attackers exploit system vulnerabilities for f...
The focus of this research revolves around Android platform security, specifically Android malware a...
In This paper the current security of various password hashing schemes that are in use today will be...
When designing and implementing a new system, one of the most common misuse cases a system administr...
In the present world, everyone uses the Internet and to access the internet they would need to use a...
SQL injection is one of several different types of code injection techniques used to attack data dri...
Most critical infrastructure depends on industrial control and automation systems to manage their pr...
There is a lack of consensus within the literature assessing whether surveillance is effective in re...
The future in how computing is done is heading in the direction of quantum computing given that the ...
Memory corruptions are a major part of security attacks observed nowadays. Many protection mechanis...
In order to support air traffic control services, the U.S. Federal Aviation Administration (FAA) has...
In our day-to-day life, web applications play an important role such as shopping, making financial t...
Analysis of The Typical Performance Routines for Recovering Data from Solid State Drive During a For...
Data de-duplication is a method used to compress information aiding in the removal of duplicate copi...
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for t...
Security attacks are becoming more prevalent as cyber attackers exploit system vulnerabilities for f...
The focus of this research revolves around Android platform security, specifically Android malware a...
In This paper the current security of various password hashing schemes that are in use today will be...