Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Rahat Masood"'
Publikováno v:
IEEE Access, Vol 11, Pp 29769-29789 (2023)
There has been a huge spike in the usage of social media platforms during the COVID-19 lockdowns. These lockdown periods have resulted in a set of new cybercrimes, thereby allowing attackers to victimise social media users with a range of threats. Th
Externí odkaz:
https://doaj.org/article/9040491e9df245b8bdcb05904818b7c9
Publikováno v:
NUST Journal of Engineering Sciences, Vol 10, Iss 2 (2017)
The current dynamic development in the field of Information and Communication Technologies (ICT) has posed various threats to critical infrastructure of the government and private sectors across the world. To mitigate the occurrence of cyberattacks,
Externí odkaz:
https://doaj.org/article/8bb6011c9b914616926fce1eedc20b8a
Publikováno v:
ACM Transactions on Privacy and Security. 23:1-27
The web is a tangled mass of interconnected services, whereby websites import a range of external resources from various third-party domains. The latter can also load further resources hosted on other domains. For each website, this creates a depende
There has been a huge spike in the usage of social media platforms during the COVID-19 lockdowns. These lockdown periods have resulted in a set of new cybercrimes, thereby allowing attackers to victimise social media users with a range of threats. Th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::49b0ebb97323e18b1dd463056b1e1cf6
http://arxiv.org/abs/2202.10543
http://arxiv.org/abs/2202.10543
Publikováno v:
Modern Socio-Technical Perspectives on Privacy ISBN: 9783030827854
This chapter studies the relationship between two important, often conflicting paradigms of online services: personalization and tracking. The chapter initially focuses on the categories and levels of online personalization, briefly overviewing algor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ab0ddfa2dd7601667d3961bb068ab7cc
https://doi.org/10.1007/978-3-030-82786-1_9
https://doi.org/10.1007/978-3-030-82786-1_9
Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker attacks that are reported almost every da
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2641d886e2d52b00c157e2fc15dbbcc7
Autor:
Rahat Masood, Suranga Seneviratne, Tianhui Hu, Yexuan Li, Weixian Yao, Weiye Lin, Imran Chowdhury
Publikováno v:
LCN
Third-party security apps are an integral part of the Android app ecosystem. Many users install them as an extra layer of protection for their devices. There are hundreds of such security apps, both free and paid in Google Play Store and some of them
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6f02e59178a44b4b6aa2b666b02cdcb2
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2018, Iss 2, Pp 122-142 (2018)
We argue that touch-based gestures on touch-screen devices enable the threat of a form of persistent and ubiquitous tracking which we call touch-based tracking. Touch-based tracking goes beyond the tracking of virtual identities and has the potential
Publikováno v:
Iran Journal of Computer Science. 1:65-87
One way to ensure reliable and secure composite web service delivery is by making them autonomous (i.e., become self-managing services, where they can be self-organizing, self-healing, self-optimizing, and self-protecting). The CRESCENT framework was
Publikováno v:
WWW
The Web is a tangled mass of interconnected services, where websites import a range of external resources from various third-party domains. However, the latter can further load resources hosted on other domains. For each website, this creates a depen