2022
DOI: 10.1155/2022/4697494
|View full text |Cite
|
Sign up to set email alerts
|

Air-Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units

Abstract: Several security tools have been described in recent times to assist security teams; however, the effectiveness and success remain limited to specific devices. Phishing is a type of cyberattack that uses fraudulent emails and websites to obtain personal information from unsuspecting users, such as passwords and credit card numbers. Hackers can gain access to your information through a variety of methods, and the most common of which are king, phishing, spear phishing, social engineering, and dictionary attacks… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…5,31 Another notable work by Vogel and Balakrishnan explored the implications of using gestures in "public spaces", highlighting the social aspects and challenges of gesture-based interfaces. 32 In VR and AR, gesture control has been crucial in creating immersive experiences. Bowman et al's comprehensive survey of 3D user interfaces elaborated on the role of gestures in navigating virtual environments.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…5,31 Another notable work by Vogel and Balakrishnan explored the implications of using gestures in "public spaces", highlighting the social aspects and challenges of gesture-based interfaces. 32 In VR and AR, gesture control has been crucial in creating immersive experiences. Bowman et al's comprehensive survey of 3D user interfaces elaborated on the role of gestures in navigating virtual environments.…”
Section: Related Workmentioning
confidence: 99%
“…Historically, the rudimentary applications of this confluence were discernible in the use of hand gestures for smartphones or tablets, a domain that has since witnessed radical metamorphosis. 14,18,[23][24][25][26][28][29][30][31][32]34,35,[37][38][39][40][41][42][43][44][45][46][47][48][49][50][51][52][53] The contemporary landscape sees gesture control permeating environments as expansive as desktops, where intricate hand movements can seamlessly manage presentations or navigate through web interfaces. 38,39 At a granular level, the progression of gesture control traverses two salient trajectories: the deployment of specialized hardware and the adoption of software-centric solutions.…”
Section: Related Workmentioning
confidence: 99%
“…Another area of study has been the use of artificial intelligence (AI) for risk assessment and decision-making in the power sector [14]. These studies investigated the use of AI algorithms to identify and prioritize potential threats, as well as to assist decision-makers in making informed risk mitigation and response decisions [15,29]. This approach to AI and cybersecurity can assist organizations in more efficiently allocating resources and making decisions based on accurate and up-to-date information [16].…”
Section: ░ 3 Literature Reviewmentioning
confidence: 99%
“…Fuel economy 11 , vehicular communication systems 12 , intelligent vehicles 13 , 14 , unmanned transportation 15 , power management algorithms 16 , Power train architecture 17 , vehicle safety 18 , grid connected electric vehicles 19 , machine control 20 , 21 and power sources lifespan enhancement 22 , 23 are a prominent current trend in the realm of automotive engineering 24 .…”
Section: Introductionmentioning
confidence: 99%