Zobrazeno 1 - 10
of 86
pro vyhledávání: '"Qureshi, Amna"'
Comparative analysis of automated scanning and manual penetration testing for enhanced cybersecurity
Autor:
Rane, Nikhil, Qureshi, Amna
Yes
Web platform security has become a significant concern in the current cyber world. Adversaries constantly advance their skills and technologies to bypass modern cyber defence techniques to lure website vulnerabilities. In the cyber world, fi
Web platform security has become a significant concern in the current cyber world. Adversaries constantly advance their skills and technologies to bypass modern cyber defence techniques to lure website vulnerabilities. In the cyber world, fi
Externí odkaz:
http://hdl.handle.net/10454/19971
Yes
Software-defined networking (SDN) and network functions virtualisation (NFV) are crucial technologies for integration in the fifth generation of cellular networks (5G). However, they also pose new security challenges, and a timely research s
Software-defined networking (SDN) and network functions virtualisation (NFV) are crucial technologies for integration in the fifth generation of cellular networks (5G). However, they also pose new security challenges, and a timely research s
Externí odkaz:
http://hdl.handle.net/10454/19970
Yes
As financial institutions navigate an increasingly complex cyber threat landscape and regulatory ecosystem, there is a pressing need for a robust and adaptive security architecture. This paper introduces a comprehensive, Zero Trust model-bas
As financial institutions navigate an increasingly complex cyber threat landscape and regulatory ecosystem, there is a pressing need for a robust and adaptive security architecture. This paper introduces a comprehensive, Zero Trust model-bas
Externí odkaz:
http://hdl.handle.net/10454/19969
Autor:
Fakolujo, Oluwapelumi, Qureshi, Amna
Yes
Software-Defined Networking (SDN), a novel and innovative networking technology, offers programmability and flexibility within networks and centralized control of those networks. The separation of data and control planes, as well as the conc
Software-Defined Networking (SDN), a novel and innovative networking technology, offers programmability and flexibility within networks and centralized control of those networks. The separation of data and control planes, as well as the conc
Externí odkaz:
http://hdl.handle.net/10454/19980
Autor:
Khan, Sara, Qureshi, Amna
Yes
Cyberbullying has become a significant problem with the surge in the use of social media. The most basic way to prevent cyberbullying on these social media platforms is to identify and remove offensive comments. However, it is hard for human
Cyberbullying has become a significant problem with the surge in the use of social media. The most basic way to prevent cyberbullying on these social media platforms is to identify and remove offensive comments. However, it is hard for human
Externí odkaz:
http://hdl.handle.net/10454/19312
Yes
Deepfakes constitute fake content -generally in the form of video clips and other media formats such as images or audio- created using deep learning algorithms. With the rapid development of artificial intelligence (AI) technologies, the dee
Deepfakes constitute fake content -generally in the form of video clips and other media formats such as images or audio- created using deep learning algorithms. With the rapid development of artificial intelligence (AI) technologies, the dee
Externí odkaz:
http://hdl.handle.net/10454/18796
Publikováno v:
In Simulation Modelling Practice and Theory January 2025 138
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
The use of peer-to-peer (P2P) networks for multimedia distribution has spread out globally in recent years. The mass popularity is primarily driven by cost-effective distribution of content, also giving rise to piracy. An end user (buyer/peer) of a P
Externí odkaz:
http://arxiv.org/abs/1703.01820
Autor:
Megías, David, Qureshi, Amna
Recombined fingerprints have been suggested as a convenient approach to improve the efficiency of anonymous fingerprinting for the legal distribution of copyrighted multimedia contents in P2P systems. The recombination idea is inspired by the princip
Externí odkaz:
http://arxiv.org/abs/1703.01348