Academic literature on the topic 'Security Vulnerabilities'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Vulnerabilities.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security Vulnerabilities"

1

Neamah, Muthanna Ibrahim. "The Security Vulnerabilities in Websites the Security." International Journal of Psychosocial Rehabilitation 24, no. 5 (2020): 4319–24. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jeo John, Precious, and Sumit Surendran. "Vulnerabilities Detection by Matching with known Vulnerabilities." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28422.

Full text
Abstract:
Vulnerability Matcher is a tool designed to identify and prioritize security vulnerabilities in software systems. This intelligent system leverages advanced machine learning algorithms to analyze and match identified vulnerabilities with known security threats and exploits. The primary function of Vulnerability Matcher is to provide developers and security professionals with a comprehensive understanding of the security risks associated with their software. It does this by scanning the codebase and identifying potential security vulnerabilities that could be exploited by malicious actors. Vuln
APA, Harvard, Vancouver, ISO, and other styles
3

TAŞ, Ruhi. "Smart Contract Security Vulnerabilities." Erzincan Üniversitesi Fen Bilimleri Enstitüsü Dergisi 16, no. 1 (2023): 196–211. http://dx.doi.org/10.18185/erzifbed.1105551.

Full text
Abstract:
A smart contract is a concept of computer protocols that helps to facilitate blockchain technology. This blockchain-based smart contract is a public ledger of all participating transactions. It is considered a self-executable application and contains predetermined rules. It also operates by decentralizing networks that are shared between all parties, and this execution of contracts between parties could be securely done without a middleman or a third party. With blockchain technology, developers could provide an efficient framework and ensure security issues. While the new blockchain has succe
APA, Harvard, Vancouver, ISO, and other styles
4

Brumă, Ovidiu-Vasile. "Vulnerabilities of Information Systems." International Journal of Information Security and Cybercrime 9, no. 1 (2020): 9–14. http://dx.doi.org/10.19107/ijisc.2020.01.01.

Full text
Abstract:
Vulnerability of Information Systems is a major concern these days in all spheres of financial, government and even private sectors. There have been limited attempts in addressing the people who use the computers though they are the greatest loophole in information systems security. Even though most of the organizations have realized the value of information and the part it plays in the success of the business, yet only a few take adequate measures in ensuring the security of their information, preventing unauthorized access, securing data from intrusion and unapproved disclosures etc. This pa
APA, Harvard, Vancouver, ISO, and other styles
5

Shahriar, Hossain, and Mohammad Zulkernine. "Mitigating program security vulnerabilities." ACM Computing Surveys 44, no. 3 (2012): 1–46. http://dx.doi.org/10.1145/2187671.2187673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Costinela-Luminiţa, Ciobanu (Defta), and Ciobanu (Iacob) Nicoleta-Magdalena. "E-learning Security Vulnerabilities." Procedia - Social and Behavioral Sciences 46 (2012): 2297–301. http://dx.doi.org/10.1016/j.sbspro.2012.05.474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bojanova, Irena, and John J. Guerrerio. "Labeling Software Security Vulnerabilities." IT Professional 25, no. 5 (2023): 64–70. http://dx.doi.org/10.1109/mitp.2023.3314368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hafsa, Ashraf, Alenezi Mamdouh, Nadeem Muhammad, and Javid Yasir. "Security assessment framework for educational ERP systems." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 5570–85. https://doi.org/10.11591/ijece.v9i6.pp5570-5585.

Full text
Abstract:
The educational ERP systems have vulnerabilities at the different layers such as version-specific vulnerabilities, configuration level vulnerabilities and vulnerabilities of the underlying infrastructure. This research has identified security vulnerabilities in an educational ERP system with the help of automated tools; penetration testing tool and public vulnerability repositories (CVE, CCE) at all layers. The identified vulnerabilities are analyzed for any false positives and then clustered with mitigation techniques, available publicly in security vulnerability solution repository like CCE
APA, Harvard, Vancouver, ISO, and other styles
9

Fedrik, Dr E. J. Thomson, A. Vinitha, and B. Vanitha. "Review on Vulnerabilities of IoT Security." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 1117–19. http://dx.doi.org/10.31142/ijtsrd24020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jalgasbaevna, PerdebaevaInabat. "Identifying andMitigating Security Vulnerabilities inWeb Applications." American Journal of Applied Science and Technology 5, no. 5 (2025): 10–11. https://doi.org/10.37547/ajast/volume05issue05-03.

Full text
Abstract:
As web applications continue to play a critical role in modern digital infrastructure, their security has become a major concern. This article explores the most common types of security vulnerabilities in web applications, including SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), and broken authentication. It further outlines various techniques for identifying and mitigating these vulnerabilities, such as input validation, secure coding practices, use of security headers, and implementation of secure authentication mechanisms. The paper also emphasizes the importa
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security Vulnerabilities"

1

Xenitellis, Simeon. "On the identification of security vulnerabilities." Thesis, Royal Holloway, University of London, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.538785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sandgren, Per. "Security Assessment and *nix Package Vulnerabilities." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16723.

Full text
Abstract:
Background. Vulnerabilities in software provides attackers with the means to fulfill unlawful behavior. Since software has so much power, gaining control over vulnerabilities can mean that an attacker gains unauthorized powers. Since vulnerabilities are the keys that let attackers attack, vulnerabilities must be discovered and mitigated. Scanning vulnerable machines is not enough, and scanning data results must be parsed to prioritize vulnerability mitigation and conduct security assessment. Objectives. Creating a parser is the first objective, a tool that takes in input, filters it and gives out
APA, Harvard, Vancouver, ISO, and other styles
3

Borstad, Ole Gunnar. "Finding Security Patterns to Countermeasure Software Vulnerabilities." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8850.

Full text
Abstract:
<p>Software security is an increasingly important part of software development as the risk from attackers is constantly evolving through increased exposure, threats and economic impact of security breaches. Emerging security literature describes expert knowledge such as secure development best practices. This knowledge is often not applied by software developers because they lack security awareness, security training and secure development methods and tools. Existing methods and tools require too much effort and security is often given less priority in the trade-off between functionality and s
APA, Harvard, Vancouver, ISO, and other styles
4

Larsson, Josephine, and Ida Waller. "Security in wireless networks : Vulnerabilities and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2380.

Full text
Abstract:
The market for wireless networks has increased over the years, more and more organizations implement this technology. The need to work flexible, convenient and cost-effective are three reasons for the technology’s raised popularity. The use of wireless networks has exposed new aspects of network security. The information is no longer dependent on wires because it can be transmitted trough radio waves instead. The exposure of information increases, therefore also the vulnerabilities. This leads to more security problems related to the exposure of the transmitted information. It is difficult to
APA, Harvard, Vancouver, ISO, and other styles
5

Rahimi, Sanaz. "SECURITY VULNERABILITIES: DISCOVERY, PREDICTION, EFFECT, AND MITIGATION." OpenSIUC, 2013. https://opensiuc.lib.siu.edu/dissertations/696.

Full text
Abstract:
Security vulnerabilities pose a real threat to computing systems ranging from personal computers to mobile devices and critical systems. Quantification and prediction of vulnerabilities allows us to compare systems, orient and plan to mitigate vulnerabilities, and design reliable and secure systems. In this dissertation, the software Vulnerability Discovery Models (VDMs) are studied and it is illustrated that they cannot provide accurate vulnerability prediction even with large amount of historical vulnerability data. We then propose and study a scheme that incorporates software properties suc
APA, Harvard, Vancouver, ISO, and other styles
6

Liaqat, Imran. "Vulnerabilities in Security Products for Computers 2006-2008." Thesis, Linköping University, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-19472.

Full text
Abstract:
<p>Vulnerabilities are rapidly increasing everyday, posing a major threat to security products. It is due to the flaws in the software during development and human negligence. Even if we are able to find the source, it is not easy to get rid of them with the dramatic discovery of threats exposed every month. Defending against attacks, we need to understand the vulnerabilities in a large scale. The security products, which are being told to provide security, contain a lot of vulnerabilities giving a headache to the security vendors around the globe.</p><p>Information security breaches are incre
APA, Harvard, Vancouver, ISO, and other styles
7

Taylor, Barry. "Identitying vulnerabilities and controls in complex composite security architectures." Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757.

Full text
Abstract:
The ability to design and reason about architectures (here understood as organisations which are designed according to hierarchies of roles and those processes that link them) which co-exist and interact within complex environments is of increasing importance. With the introduction of more interconnected technology affecting the way in which stakeholders manage information and conduct their operations, the need for such a capability is clear. Current approaches either address this issue with a mathematical approach which presents an obstacle to most non-specialist analysts, or they choose not
APA, Harvard, Vancouver, ISO, and other styles
8

Morris, Joseph C. "Identifying potential vulnerabilities in software designs." Virtual Press, 2007. http://liblink.bsu.edu/uhtbin/catkey/1380105.

Full text
Abstract:
Software engineers currently rely on lengthy source code reviews, testing, and static analysis tools to attempt identification of software vulnerabilities. While these are sometimes effective, the methods used are limited and don't catch all security vulnerabilities.Work has been done in identifying areas of software prone to failure through a design metrics approach, and with success. This study aims to extend this idea to software security. The premise of this thesis is that the set of security vulnerabilities overlaps (or may be a subset of) the overall set of software bugs and failures. It
APA, Harvard, Vancouver, ISO, and other styles
9

Gaboriau-Couanau, Clément. "Security of Embedded Software : An Analysis of Embedded Software Vulnerabilities and Related Security Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215703.

Full text
Abstract:
The increased use of computer systems for storing private data or doing critical operations leads to some security issues gathered in the area cybersecurity. This neologism leads people to think about the security of information systems and general-purpose computers. However, with the growth of the Internet of Things, embedded systems are also concerned with these issues. The speed of development of this area often leads to a backwardness in the security features. The thesis investigates the security of embedded systems by focusing on embedded software. After classifying the vulnerabilities wh
APA, Harvard, Vancouver, ISO, and other styles
10

Tevis, Jay-Evan J. Hamilton John A. "Automatic detection of software security vulnerabilities in executable program files." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/doctoral/TEVIS_JAY-EVAN_36.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security Vulnerabilities"

1

Maurushat, Alana. Disclosure of Security Vulnerabilities. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5004-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cordner, Lee. Maritime Security Risks, Vulnerabilities and Cooperation. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-62755-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Romanosky, Sasha. Managing and auditing IT vulnerabilities. The Institute of Internal Auditors, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maurushat, Alana. Disclosure of Security Vulnerabilities: Legal and Ethical Issues. Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

National Infrastructure Protection Center (U.S.). Best practices for wireless fidelity (802.11b) network vulnerabilities. National Infrastructure Protection Center, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Department of Homeland Security. Office of Inspector General. Vulnerabilities highlight the need for more effective web security management. U.S. Dept. of Homeland Security, Office of Inspector General, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

National Research Council (U.S.). Committee on Assessing Vulnerabilities Related to the Nation's Chemical Infrastructure., National Research Council (U.S.). Division on Earth and Life Studies., and National Research Council (U.S.). Transportation Research Board., eds. Terrorism and the chemical infrastructure: Protecting people and reducing vulnerabilities. National Academies Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

John, Adams. Remaking American security: Supply chain vulnerabilities & national security risks across the U.S. defense industrial base. Alliance for American Manufacturing, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security Vulnerabilities"

1

Lakshmiraghavan, Badrinarayanan. "Security Vulnerabilities." In Pro ASP.NET Web API Security. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5783-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liska, Allan. "Vulnerabilities in NTP." In NTP Security. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2412-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McCreight, Robert. "Reconceptualizing Security Vulnerabilities." In Handbook of Security Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-51761-2_43-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McCreight, Robert. "Reconceptualizing Security Vulnerabilities." In Handbook of Security Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sharma, Sachin Kumar, Arjun Singh, Punit Gupta, and Vijay Kumar Sharma. "Web Security Vulnerabilities." In Cybersecurity. CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Widdowson, Amanda. "Organisational vulnerabilities." In Humans and Cyber Security. CRC Press, 2025. https://doi.org/10.1201/9781003427681-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Widdowson, Amanda. "Individual vulnerabilities." In Humans and Cyber Security. CRC Press, 2025. https://doi.org/10.1201/9781003427681-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ghosh, Anup K., Kurt Baumgarten, Jennifer Hadley, and Steven Lovaas. "Web-Based Vulnerabilities." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Campbell, Tony. "Threats and Vulnerabilities." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Martellini, Maurizio, Stanislav Abaimov, Sandro Gaycken, and Clay Wilson. "Modeling Vulnerabilities." In Information Security of Highly Critical Wireless Networks. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52905-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security Vulnerabilities"

1

V, Mareeswari, Vijayan R, and Ashish Shukla. "Bluetooth Vulnerabilities and Security." In 2025 International Conference on Emerging Smart Computing and Informatics (ESCI). IEEE, 2025. https://doi.org/10.1109/esci63694.2025.10987941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dhabliya, Dharmesh, N. Thangarasu, Shivam Khurana, X. Mercilin Raajini, Shobhit Goyal, and D. T. Arunkumar. "Vehicular Network Security: Threats, Vulnerabilities and Countermeasures." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yih, Jason, Katerina Goseva-Popstojanova, and Michel Cukier. "On Security Vulnerabilities in Transportation IoT Devices." In 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2025. https://doi.org/10.1109/dsn64029.2025.00061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sirija, M., Yashwant V. Dongre, Akhilendra Pratap Singh, V. Haripriya, Prateek Aggarwal, and Satendra Singh. "Investigating the Vulnerabilities of Encapsulating Security Payload in Wireless Network Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Iyer, Ravishankar K. "Security vulnerabilities." In the 2006 ACM Symposium. ACM Press, 2006. http://dx.doi.org/10.1145/1128817.1128823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hernandez, Juan Carlos Galan, and Miguel Angel Leon Chavez. "Moodle security vulnerabilities." In 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE). IEEE, 2008. http://dx.doi.org/10.1109/iceee.2008.4723399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rotella, Pete. "Software security vulnerabilities." In ICSE '18: 40th International Conference on Software Engineering. ACM, 2018. http://dx.doi.org/10.1145/3194707.3194708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dawood, Harith A., and Khalid F. Jassim. "Mitigating IPv6 Security Vulnerabilities." In 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE, 2013. http://dx.doi.org/10.1109/acsat.2013.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yadav, Saurav, Aviral Apurva, Pranshu Ranakoti, Shashank Tomer, and Nihar Ranjan Roy. "Android vulnerabilities and security." In 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN). IEEE, 2017. http://dx.doi.org/10.1109/ic3tsn.2017.8284477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Xueying, Evgenios Karampatzakis, Christian Doerr, and Fernando Kuipers. "Security Vulnerabilities in LoRaWAN." In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 2018. http://dx.doi.org/10.1109/iotdi.2018.00022.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security Vulnerabilities"

1

Murphy, S. BGP Security Vulnerabilities Analysis. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Seacord, Robert C., and Allen D. Householder. A Structured Approach to Classifying Security Vulnerabilities. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada430968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pritchard, Jack K., and Michael Moon. Energy Security: Reducing Vulnerabilities to Global Energy Networks. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada497815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Miguel De Vera, Anton, Viktoriia Hamaiunova, Réka Koleszár, and Giada Pasquettaz. Future Resilience of the European Technology Security Policy Paper. European Center for Populism Studies (ECPS), 2024. http://dx.doi.org/10.55271/pop0004.

Full text
Abstract:
This paper explores vulnerabilities in the European Union’s technological security, focusing on Huawei as a case study to illuminate broader security challenges. Amid intensifying US-China tensions, especially under former US President Donald Trump, the EU encountered new risks linked to the strategic positioning of Chinese tech firms within critical European infrastructure. Trump’s "America First" policy targeted China with tariffs and trade restrictions to address perceived unfair practices, triggering disruptions in global supply chains that reverberated through the EU economy. For Europe,
APA, Harvard, Vancouver, ISO, and other styles
5

Black, Paul E., and Elizabeth N. Fong. Report of the Workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV). National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.500-320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Seyuba, Katongo. Climate, Peace and Security in Eastern Democratic Republic of the Congo. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/tcsw2134.

Full text
Abstract:
Local communities in eastern Democratic Republic of the Congo (DRC) face the combined challenge of climate change and violent conflict, which exacerbates vulnerabilities, poverty, displacement and human insecurity. This SIPRI Insights Paper examines how climate change interacts with existing vulnerabilities in North Kivu and South Kivu to heighten human insecurity and conflict risks. The findings highlight that the link between climate change and conflict is shaped by the governance and accessibility of natural resources such as land and water. Changes in the availability and quality of such r
APA, Harvard, Vancouver, ISO, and other styles
7

Hoffman, Wyatt. "Making AI Work for Cyber Defense: The Accuracy-Robustness Tradeoff ". Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2021ca007.

Full text
Abstract:
Artificial intelligence will play an increasingly important role in cyber defense, but vulnerabilities in AI systems call into question their reliability in the face of evolving offensive campaigns. Because securing AI systems can require trade-offs based on the types of threats, defenders are often caught in a constant balancing act. This report explores the challenges in AI security and their implications for deploying AI-enabled cyber defenses at scale.
APA, Harvard, Vancouver, ISO, and other styles
8

Carlos, Jean Clarisse. Bridging Resilience: Women at the Crossroads of Peace, Security, and Disaster Risk Management in the Philippines. Philippine Institute for Development Studies, 2025. https://doi.org/10.62986/pn2025.02.

Full text
Abstract:
Women face compounded vulnerabilities at the intersection of gender issues, conflict, and natural disasters, further exacerbated by socioeconomic inequalities. This Policy Note emphasizes the need to align the National Action Plan on Women, Peace, and Security (NAPWPS) 2023–2033 with the National Disaster Risk Reduction and Management Plan (NDRRMP) 2020–2030 to integrate gender perspectives and enhance women's leadership in these areas. Furthermore, it recommends developing strategic communication plans to promote women's roles in peacebuilding and disaster management, enhancing data collectio
APA, Harvard, Vancouver, ISO, and other styles
9

Tayeb, Shahab. Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2132.

Full text
Abstract:
The ever-evolving technology interwoven into the transportation industry leaves it frequently at risk for cyber-attacks. This study analyzes the security of a common in-vehicle network, the Controller Area Network (CAN), standard in most vehicles being manufactured today. Like many other networks, CAN comes with inherent vulnerabilities that leave CAN implementations at risk of being targeted by cybercriminals. Such vulnerabilities range from eavesdropping, where the attacker can read the raw data traversing the vehicle, to spoofing, where the attacker can place fabricated traffic on the netwo
APA, Harvard, Vancouver, ISO, and other styles
10

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!