Secure by default

Security by default, in software, means that the default configuration settings are the most secure settings possible, which are not necessarily the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
SM2 is a public key cryptography suite originating from Chinese standards, including digital signatures and public key encryption… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 3
  • figure 4
Is this relevant?
Review
2018
Review
2018
In recent years, several cases of DDoS attacks using IoT botnets have been reported, including the largest DDoS known, caused by… (More)
  • figure 1
  • figure 2
Is this relevant?
2017
2017
Default configuration of various software applications often neglects security objectives. We tested the default configuration of… (More)
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2017
2017
Capsicum [Wat+10] is a framework for principled, coherent compartmentalization of FreeBSD applications. It is principled in that… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2015
2015
The Eyes of Things (EoT) EU H2020 project envisages a computer vision platform that can be used both standalone and embedded into… (More)
Is this relevant?
2015
2015
At a time where the available Internet Protocol version 4 (IPv4) address pools are running out, still too many Internet Service… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
  • 2013
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension… (More)
  • figure 1
  • figure 2
Is this relevant?
2007
2007
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?