Suggested Topics within your search.
Suggested Topics within your search.
- Biology 1
- DNA 1
- English language 1
- Grammar 1
- Handbooks, manuals, etc 1
- Report writing 1
- Rhetoric 1
-
41
The Nexus between CDS Premiums and Exchange Rates: Evidence from BRICS Countries and Türkiye
Published 2024-12-01“…Utilizing the RALS-LM unit root test and the RALS-EG cointegration test, and Hacker and Hatemi-J bootstrap causality test, this research circumvents the limitations commonly associated with traditional econometric approaches. …”
Get full text
Article -
42
TÜRKİYE’DE DÖVİZ KURU OYNAKLIĞI VE HANEHALKI HARCAMALARI ARASINDAKİ İLİŞKİ
Published 2019-12-01“…Çalışma verileri1998-2017 yılları arasında üçer aylık periyotlar kullanılarak oluşturulmuştur.Döviz kuru belirsizliğine ait değerlerin elde edilmesinde GARCH modelinden faydalanılmıştır.Reel tüketim harcamaları ve döviz kuru belirsizliği arasındaki nedensellikilişkisini incelemek amacıyla Hacker ve Hatemi-J (2006) simetrik ve Hatemi-J(2012) asimetrik nedensellik testleri uygulanmıştır. …”
Get full text
Article -
43
Altın, Borsa, Döviz Piyasalarının Ekonomik Güven Endeksine Etki Sınaması: Türkiye Örneği
Published 2021-05-01“…Ardından değişkenler arasında nedensellik ilişkileri incelenmek üzere sırasıyla, Toda-Yamamoto ve Boostrapa Dayalı Hacker-Hatemi J Granger Nedensellik Testi, Hatemi ve Roca Asimetrik Nedensellik Testi, Balcılar vd. …”
Get full text
Article -
44
A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation
Published 2022-01-01“…In the new era of cryptography, Substitution Boxes (S-Boxes) are very important to raise confusion in cipher text and the security of encryption directly depends on the algebraic strength of S-box. To avoid a hacker attack, researchers are focusing on creating dynamic S-boxes that are much stronger. …”
Get full text
Article -
45
THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS
Published 2025-01-01“…The list of threats has been expanded according to the following criteria: - by the nature of implementation: overt - obsolescence of equipment, programs, technologies; covert - hacker attacks; - by the mechanism of influence: indirect - lack of motivation among teachers for research, advanced training, or the introduction of innovative teaching methods; direct - an overly large administrative apparatus, irrational management structure and division of responsibilities, or insufficient control; - by the place of origin: internal threats, as threats can also originate within the institution - insufficient qualifications of top management, reluctance of teachers to develop, sabotage of new technologies, corruption or bribery, unethical behavior. …”
Get full text
Article -
46
Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal
Published 2022-05-01“…The average NPCR, UACI, and correlation coefficient (CC) are 96.57%, 35.43%, and 0.005, respectively, between the plain PPG and the encrypted PPG data against hacker attacks. The larger‐the‐better of NPCR and UACI indexes and the smaller‐the‐better of CC index are obtained to evaluate the efficiency of the proposed cryptography method. …”
Get full text
Article -
47
Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)
Published 2024-01-01“…In a public channel, IoMTS must ensure information security for protection against hacker attacks. Hence, in this study, a symmetric encryption and decryption protocol was designed to ensure infosecurity of biosignals and medical images and assist in specific purposes in disease diagnosis. …”
Get full text
Article -
48
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01“…Aiming at the problem that APT analysis reports have not been fully utilized, and there is a lack of automation methods to generate structured knowledge and construct feature portraits of the hacker organizations, an automatic knowledge extraction method of APT attacks combining entity recognition and entity alignment is proposed. …”
Get full text
Article -
49
Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data
Published 2025-02-01“…With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). …”
Get full text
Article -
50
Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud
Published 2024-01-01“…The data in the cloud is highly vulnerable and may fall prey to hackers. The hackers tend to attack the data in the public network, deteriorating the range of confidentiality and the authentication of the data. …”
Get full text
Article -
51
Implementation of Coding Theory with The Extended Hamming Code in Steganography
Published 2024-01-01“…Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. …”
Get full text
Article -
52
Research towards IoT-oriented universal control system security model
Published 2012-11-01“…In Internet of things,the control loop of industrial Ethernet and real-time Ethernet is easily exploited by hackers for malicious attacks,causing serious security incidents in the physical world; a universal control system model (IoTC) was put forward by analysing the working principle of the control system in IoT,on which some disturbing factors the system faces were discussed; for the disturbing factors in the system,one universal control system security model (S-IoTC) was given,adding security authentication module in responding disturbing factor to achieve secure system; the components,safety justice and typical realization process of S-IoTC were also described in detail at last.…”
Get full text
Article -
53
Research on Face Recognition Method by Autoassociative Memory Based on RNNs
Published 2018-01-01“…In order to avoid the risk of the biological database being attacked and tampered by hackers, an Autoassociative Memory (AAM) model is proposed in this paper. …”
Get full text
Article -
54
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
55
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01“… The increasing significance of cybersecurity underscores the critical necessity of addressing evolving methods of hackers. This research investigates the way to classify and predict cyber-attacks on the NSL-KDD dataset using intrusion detection methods the investigation contrasts the capabilities of various algorithms, including RNN, MLP, CNN-LSTM, and ANN, in recognizing attacks. …”
Get full text
Article -
56
A STUDY ON SECURITY FOR WEB-BASED APPLICATIONS
Published 2017-06-01“…This is mainly due to the hackers’ progress, the advent of new technologies, and the fact that today’s systems are increasingly complex and it is difficult to manage all risks. …”
Get full text
Article -
57
Analysis of security extension protocol in e-mail system
Published 2020-12-01“…E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved.…”
Get full text
Article -
58
ANTI-WEBSITE DEFACEMENT SYSTEM
Published 2018-07-01“…Recently the impacts of hackers’ attacks which change the interface and content of Website are particularly serious. …”
Get full text
Article -
59
Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Data from the device can be hacked and modified by hackers. By implementing encryption algorithms on Bluetooth Low Energy devices it can guarantee data confidentiality aspects and can prevent hackers from eavesdropping and stealing data. …”
Get full text
Article -
60
The effect of using Naive Bayes to detect spam email
Published 2025-01-01“…However, it has also become a channel for spreading undesirable information, such as content from hackers, viruses, violence, pornography, and superstition. …”
Get full text
Article