Found about 6 results
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science and Information Technology, United States of America, Volume 13 Issue 6, June 2024
223 - 228Unveiling Vulnerabilities in Serial Printer Point - of - Sale Systems: A Hardware Analysis Approach
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science and Information Technology, United States of America, Volume 12 Issue 10, October 2023
2206 - 2207Automating Vulnerability Prioritization Using Machine Learning and Financial Impact Analysis
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 12, December 2022
1404 - 1405Next - Generation SIEM: The Shift Towards Extended Detection and Response (XDR)
Santosh Kumar Kande [6] | Alex Harris
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science and Information Technology, United States of America, Volume 12 Issue 8, August 2023
2141 - 2561Proactive Phishing Threat Exposure Mitigation through Adaptive Vulnerability Management: Utilizing Threat Intelligence, User Behavior Analytics, and Predictive Analytics
Downloads: 0
Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 2, February 2022
1376 - 1377Beyond Baselines: Customizing Configuration Compliance for Industry-Specific Threat Models
Downloads: 0
Research Paper, Information Security, United States of America, Volume 13 Issue 3, March 2024
1953 - 1955