Zobrazeno 1 - 8
of 8
pro vyhledávání: '"P. R. Lakshmi Eswari"'
Publikováno v:
Information and Communication Technology for Competitive Strategies (ICTCS 2021) ISBN: 9789811900976
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::877adcad196ef2a69413eaf07c13de2d
https://doi.org/10.1007/978-981-19-0098-3_16
https://doi.org/10.1007/978-981-19-0098-3_16
Autor:
Mahesh U. Patil, P. R. Lakshmi Eswari, Sai Gopal Tatikayala, Satyanadha Sarma Samavedam, Yuvraj Sanjayrao Takey
Publikováno v:
2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS).
In recent times, attackers are continuously developing advanced techniques for evading security, stealing personal financial data, Intellectual Property (IP) and sensitive information. These attacks often employ multiple attack vectors for gaining in
Publikováno v:
Information Systems Security ISBN: 9783030925703
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3162ce401c5868fac5ce0dcc9aca6ecc
https://doi.org/10.1007/978-3-030-92571-0_6
https://doi.org/10.1007/978-3-030-92571-0_6
Publikováno v:
Communication Software and Networks ISBN: 9789811553967
In this digital era, most of the documents such as Educational Certificates, Memorandum of Understanding (MoU)s/Agreements, Driving Licenses, Health Records, Employee Service Records, Sale Deeds and Property Registration Records, Birth and Death Cert
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5f2a803ea06d55247a52f5c03525ef4c
https://doi.org/10.1007/978-981-15-5397-4_58
https://doi.org/10.1007/978-981-15-5397-4_58
Publikováno v:
ICSSA
Wi-Fi-enabled Small Office/Home Office (SOHO) routers have become ubiquitous for having internet access in many network environments. With the advent of the ‘Internet of Things’ (IoT) and smart devices, almost all household devices are connected
Publikováno v:
International Journal of Security, Privacy and Trust Management. 5:01-06
Trusted Computing intends to make PC platform trustworthy so that a user can have level of trust when working with it. To build a level of trust TCG gave specification of TPM, as integral part of TCB, for providing root(s) of trust. Further TCG defin
Publikováno v:
International Journal of Intelligent Computing Research. 3:249-254
Malware threat is continuously growing with sophistication. Though multiple layers of defense are provided at perimeter, network, host, application and data levels, it is still becoming a challenge to address malware related problems. They have grown
Publikováno v:
Information Systems Security ISBN: 9783540307068
ICISS
ICISS
Looking through the past couple of decades in information security we can say that sophistication and advancements are not limited to information security solutions alone but also in parallel applies to cyber exploits and crimes which have grown both
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2fb4621506b6100e75223ca59506b8ad
https://doi.org/10.1007/11593980_28
https://doi.org/10.1007/11593980_28