Computer Sciences

A deep learning technique to generate DNS amplification attacks

Deep learning techniques have recently proved to be highly promising for detecting cybersecurity attacks and determining their nature. Concurrently, many cybercriminals have been devising new attacks aimed at interfering ...

Security

A model that can help inexperienced users identify phishing emails

Phishing attacks are cyber-attacks through which criminals trick users into sending them money and sensitive information, or into installing malware on their computer, by sending them deceptive emails or messages. As these ...

Internet

Study shows that online privacy has become a cause of inequality

As information and communications technology (ICT) systems proliferate, it has become essential for the privacy of users to be considered and safeguarded. While there are many existing ways to protect users' digital privacy, ...

Computer Sciences

A new feature selection technique for intrusion detection systems

Network-based technologies have become increasingly widespread, and they are now being used by countless individuals, professionals, and businesses worldwide. Despite their advantages, most network-based systems are highly ...

page 1 from 40