Zobrazeno 1 - 10
of 857
pro vyhledávání: '"Security attacks"'
Publikováno v:
Journal of Applied Engineering and Technological Science, Vol 6, Iss 1 (2024)
The proliferation of IoT devices across sectors such as home automation, business, healthcare, and transportation has led to the generation of vast amounts of sensitive data. This widespread adoption has introduced significant security challenges and
Externí odkaz:
https://doaj.org/article/5e919bb0ed024d37b1fa0f79d7f0c62f
Autor:
Rodney Sebopelo, Bassey Isong
Publikováno v:
Journal of Information Systems and Informatics, Vol 6, Iss 1, Pp 464-494 (2024)
In the evolving landscape of Software-Defined Networking (SDN), the strategic placement of controllers poses a critical challenge that necessitate a precise balance between network performance and security. This paper presents an integrated framework
Externí odkaz:
https://doaj.org/article/5186a3b305b4426ebd66a0fabffce1e4
Autor:
Rabab Ali Abumalloh, Mahmud Alrahhal, Nahla El-Haggar, Albandari Alsumayt, Zeyad M. Alfawaer, Sumayh S. Aljameel
Publikováno v:
Emerging Science Journal, Vol 8, Iss 1, Pp 140-152 (2024)
Cyber-attacks have become increasingly prevalent with the widespread integration of technology into various aspects of our lives. The surge in social media platform usage has prompted users to share their firsthand experiences with cyber-attacks. Des
Externí odkaz:
https://doaj.org/article/7d2ba8ca4fc6483d8c2a4b5184ddb7b6
Publikováno v:
Vehicles, Vol 6, Iss 1, Pp 484-508 (2024)
Connected and automated vehicles (CAV) are increasingly recognized as a critical component of intelligent transportation systems (ITS), contributing to advances in transportation safety and mobility. However, the implementation of CAV in a real-world
Externí odkaz:
https://doaj.org/article/98d7fc18bd4d4a7b84b2879802a2e0c7
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-23 (2024)
Abstract Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud data storage has gained significant success, thanks to its advantages in maintenance, performa
Externí odkaz:
https://doaj.org/article/ae5e71bb16134b74a55772995ae03e0d
Publikováno v:
IEEE Access, Vol 12, Pp 161096-161133 (2024)
In recent years industry’s pursuit of Underwater Wireless Sensor Networks (UWSN) has surged because of UWSN’s advancements in commercial and military applications as well as monitoring marine life. Owing to its capabilities, open acoustic channel
Externí odkaz:
https://doaj.org/article/cc4d9b99cc8e44678403188880a04cbc
Publikováno v:
IEEE Access, Vol 12, Pp 68648-68667 (2024)
Vehicular Ad-Hoc Networks (VANETs) offer enhanced road safety, efficient traffic management, and improved vehicle connectivity while dealing with privacy and security challenges in public communication. In these networks, authentication mechanisms ar
Externí odkaz:
https://doaj.org/article/9a314802e17f4b6da6e35b8a36d69eff
Publikováno v:
IEEE Access, Vol 12, Pp 53408-53423 (2024)
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core objective of this paper is to identi
Externí odkaz:
https://doaj.org/article/5058fd0aa8b4463ba193df4e130b81d0
Autor:
Muhammad Qasim, Muhammad Waleed, Tai-Won Um, Peyman Pahlevani, Jens Myrup Pedersen, Asif Masood
Publikováno v:
IEEE Access, Vol 12, Pp 28898-28910 (2024)
Cyberspace faces unparalleled threats due to the rapid rise in botnet attacks and their profound repercussions. Utilizing AI-assisted systems emerges as a potent solution for detecting and neutralizing such attacks. Existing research on botnet attack
Externí odkaz:
https://doaj.org/article/9c460e1e102442bbb72a6965b61caf10
Autor:
Kenneth Ohei
Publikováno v:
Khazanah Hukum, Vol 5, Iss 2, Pp 105-129 (2023)
The escalating integration of smartphones within organizational frameworks has been driven by their augmented functionality, especially pertinent during the global pandemic. However, this surge in device utilization has concurrently amplified concern
Externí odkaz:
https://doaj.org/article/6f68f7b4bccd43e9a51945a718f26394