Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Syed Muhammad Sajjad"'
Publikováno v:
IEEE Access, Vol 12, Pp 143434-143457 (2024)
Steganography, an intricate technique that discreetly conceals information within innocuous carrier files, has become indispensable for safeguarding confidential communication. Hence, a comprehensive exploration of its multifaceted aspects and consti
Externí odkaz:
https://doaj.org/article/1337eed0c4b34f6d97a1e2f54a3813a1
Autor:
Muhammad Shanawar Javed, Syed Muhammad Sajjad, Danish Mehmood, Khawaja Mansoor, Zafar Iqbal, Muhammad Kazim, Zia Muhammad
Publikováno v:
Information, Vol 15, Iss 8, p 495 (2024)
The Tor browser is widely used for anonymity, providing layered encryption for enhanced privacy. Besides its positive uses, it is also popular among cybercriminals for illegal activities such as trafficking, smuggling, betting, and illicit trade. The
Externí odkaz:
https://doaj.org/article/0dca2127c27b4bbcadf45401d204fe69
Publikováno v:
Future Internet, Vol 16, Iss 5, p 176 (2024)
The Metaverse brings together components of parallel processing computing platforms, the digital development of physical systems, cutting-edge machine learning, and virtual identity to uncover a fully digitalized environment with equal properties to
Externí odkaz:
https://doaj.org/article/03bf97489d9f476ca70d4fd9a8a5aa06
Publikováno v:
IEEE Access, Vol 8, Pp 164200-164213 (2020)
Distributed Denial of Service (DDoS) attacks have caused significant disruptions in the operations of Internet-based services. These DDoS attacks use large scale botnets, which often exploit millions of compromised Internet of Things (IoT) devices wo
Externí odkaz:
https://doaj.org/article/fbcd77fdc6b24455bd6ac2325609b3fa
Autor:
Kabir, Syed Muhammad Sajjad
Publikováno v:
In Asian Journal of Psychiatry April 2018 34:74-77
Autor:
Syed Muhammad Sajjad, Muhammad Rafiq Mufti, Muhammad Yousaf, Waqar Aslam, Reem Alshahrani, Nadhem Nemri, Humaira Afzal, Muhammad Asghar Khan, Chien-Ming Chen
Publikováno v:
Wireless Communications and Mobile Computing.
DDoS (distributed denial of service) attacks have drastically effected the functioning of Internet-based services in recent years. Following the release of the Mirai botnet source code on GitHub, the scope of these exploitations has grown. The attack
Publikováno v:
Illness, Crisis & Loss. 29:327-339
The aim of this research is to provide an overview of the self-esteem and inferiority complex of madrasa students in Bangladesh. The adapted Bangla version of Rosenberg’s self-esteem scale and Pati’s inferiority questionnaire were administered in
Publikováno v:
FIT
Less protected Internet of Things (IoT) devices are a threat to the stability of the Internet. These IoT devices are being used for Distributed Denial of Service (DDoS) attacks. Due to these reasons safety and security of IoT devices are challenged.
Publikováno v:
2019 15th International Conference on Emerging Technologies (ICET).
Adaptation of artificial intelligence (AI) based solutions at sensitive locations is growing rapidly. Use of these techniques along with surveillance cameras has become a primary requirement of smart cities to convert data into intelligible informati
Publikováno v:
2019 22nd International Multitopic Conference (INMIC).
Internet of Things (IoT) emerged as a huge network of physical objects while extending the traditional internet devices. Cisco reported that there should be 50 billion internet-connected devices by 2020. IoT devices provide sensitive information but