Cybersecurity Strategies for SMEs in the Nordic Baltic Region
Abstract: Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the
Read moreAbstract: Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the
Read moreAbstract: The involvement of the Internet in the production of daily life has increased the demand for the security of
Read moreAbstract: The presence of anomalous traffic on the network causes some dangers to network security. To address the issue of
Read moreAbstract: The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker
Read moreAbstract: Technological developments make it easier for people to communicate and share information. Facebook Messenger is an instant messenger that
Read moreAbstract: Ransomware is a type of revenue-generating tactic that cybercriminals utilize to improve their income. Businesses have spent billions of
Read moreAbstract: In this day and age, Internet has become an innate part of our existence. This virtual platform brings people
Read moreAbstract: Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known
Read moreAbstract: Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known
Read moreAbstract: This research entails an investigation into enhanced attack detection techniques as a security feature in vehicular platooning. The paper evaluates critical challenges in the security of Vehicular Ad hoc Networks (VANETs) with a focus on vulnerabilities in vehicle platooning. We evaluate the possibilities of securing a platoon through enhanced attack detection following an inside attack while considering current communication-based approaches to vehicular platoon security that have been effective at isolating infected platoon members.
Read more