Zobrazeno 1 - 10
of 282
pro vyhledávání: '"Muttukrishnan, Rajarajan"'
Publikováno v:
Smart Agricultural Technology, Vol 9, Iss , Pp 100616- (2024)
The primary aim of this study was to explore cybersecurity threats in agriculture 4.0 and 5.0, as well as possible mitigation strategies. A secondary method was employed involving narrative review in which many studies on cybersecurity were sampled a
Externí odkaz:
https://doaj.org/article/30629bf8ceef4f95a59fb437e84bf53d
Publikováno v:
IEEE Access, Vol 12, Pp 149977-149987 (2024)
Using raw sensitive data of end-users helps service providers manage their operations efficiently and provide high-quality services to end-users. Although access to sensitive information benefits both parties, it poses several challenges concerning e
Externí odkaz:
https://doaj.org/article/134284ee991f4f27b9d12686daccff7b
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-12 (2023)
Abstract Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does not adequately quantify or monet
Externí odkaz:
https://doaj.org/article/794fdadf017f4029b8c7b2f71a433f1a
Autor:
Umme Zahoora, Asifullah Khan, Muttukrishnan Rajarajan, Saddam Hussain Khan, Muhammad Asam, Tauseef Jamal
Publikováno v:
Scientific Reports, Vol 12, Iss 1, Pp 1-15 (2022)
Abstract Ransomware attacks pose a serious threat to Internet resources due to their far-reaching effects. It’s Zero-day variants are even more hazardous, as less is known about them. In this regard, when used for ransomware attack detection, conve
Externí odkaz:
https://doaj.org/article/33a1345e7ad94ef0a6e8577cc7a6c9c2
Publikováno v:
IEEE Access, Vol 7, Pp 133274-133289 (2019)
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search. Such attribute enabled searchable encryption is most suitable for applications where the c
Externí odkaz:
https://doaj.org/article/957af739796a4998a175d7328163ed23
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Cryptography, Vol 5, Iss 4, p 38 (2021)
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on mo
Externí odkaz:
https://doaj.org/article/864d72bba5ba45328a3aef1f12d2fb3d
Publikováno v:
Applied Intelligence. 52:13941-13960
Publikováno v:
Journal of Communications and Networks. 23:360-373
The outbreak of the COVID-19 virus has caused widespread panic and global initiatives are geared towards treat-ment and limiting its spread. With technological advancements, several mechanisms and mobile applications have been developed that attempt
Autor:
Kamran Zaidi, Muttukrishnan Rajarajan
Publikováno v:
Future Internet, Vol 7, Iss 3, Pp 257-275 (2015)
The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS). Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road tra
Externí odkaz:
https://doaj.org/article/a0a28989b72349909d83c0f148f0dfac