Zobrazeno 1 - 10
of 112
pro vyhledávání: '"Benjamin Aziz"'
Autor:
Benjamin Aziz
Publikováno v:
PLoS ONE, Vol 18, Iss 8, p e0286856 (2023)
Multi-user computer environments pose potential threats to users data in organisations, in that unauthorised subsequent users who log on to the same computer could leak, alter or delete data belonging to users who previously logged in to the same com
Externí odkaz:
https://doaj.org/article/357d92a5bf1e40b0962c12a5032954c3
Publikováno v:
Array, Vol 15, Iss , Pp 100221- (2022)
There is an increasing demand for digital crypto-currencies to be more secure and robust to meet the following business requirements: (1) low transaction fees and (2) the privacy of users. Nowadays, Bitcoin is gaining traction and wide adoption. Many
Externí odkaz:
https://doaj.org/article/4b07f14f2d0c43d2abca3ba86a093529
Publikováno v:
IEEE Access, Vol 8, Pp 91311-91325 (2020)
The use of online social networks has become a crucial activity for individuals in recent years. Users have started to share more data in online social networking platforms. The shared content sometimes includes more than one user's information. This
Externí odkaz:
https://doaj.org/article/a3477e6fbaef499d8b544c4c8e70aa50
Publikováno v:
IEEE Access, Vol 5, Pp 16111-16123 (2017)
The increasing complexity of modern day networked applications and the massive demand on the Internet resources has reignited interest and concern in the underlying networking infrastructures and their ability to cope with such complexity and adapt t
Externí odkaz:
https://doaj.org/article/92e9c098c07b4c8992ffa9482b4bb6db
Publikováno v:
Applied Sciences, Vol 10, Iss 22, p 8188 (2020)
In this study, we evaluated one of the modern automated steganalysis tools, Stegdetect, to study its false negative rates when analysing a bulk of images. In so doing, we used JPHide method to embed a randomly generated messages into 2000 JPEG images
Externí odkaz:
https://doaj.org/article/312ab662b7f74b37802cce5be1717100
Publikováno v:
Applied Sciences, Vol 10, Iss 10, p 3411 (2020)
There is increasing demand in modern day business applications for communication networks to be robust and reliable due to the complexity and critical nature of such applications. As such, data delivery is expected to be reliable and secure even in t
Externí odkaz:
https://doaj.org/article/79c41ea13dcd4f9a81425675422f8875
Autor:
null Benjamin Aziz
Publikováno v:
Research Briefs on Information and Communication Technology Evolution. 7:50-56
Computer forensic tools are tools concerned with the identification, recovery, preservation and analysisof evidence in digital media involved in criminal investigations and illegal cases. String searchtools are a special class of such forensic tools,
Autor:
Jeyong Jung, Benjamin Aziz
Publikováno v:
Aziz, B & Jung, J 2021, ' A study on securing safety via application of the blind spot metrics for report cases of the police ', Safety Culture Research, vol. 12, no. 1, pp. 47-58 . https://doi.org/10.52902/kjsc.2021.12.47
One of the great challenges of Information and Communication Technology is the difficulty of measuring its efficiency. Previous literature mostly examined correlations between police response time and other features, but failed to quantitatively meas
Autor:
Benjamin Aziz
Publikováno v:
Aziz, B 2020, ' Modeling and analysing an industry 4.0 communication protocol ', IEEE Internet of Things Journal, vol. 7, no. 10, pp. 10120-10127 . https://doi.org/10.1109/JIOT.2020.2999325
The increasing complexity and criticality of industrial automation systems, embodied by the concept of Industry 4.0, which brings together concepts, such as cyber–physical systems, the Internet of Things, big data, and artificial intelligence, call
Autor:
Benjamin Aziz
Publikováno v:
SpringerBriefs in Applied Sciences and Technology ISBN: 9783030911522
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7b6a7ee5bc4ddd312820a5b3fbb9a7fa
https://doi.org/10.1007/978-3-030-91153-9
https://doi.org/10.1007/978-3-030-91153-9