Skip to main content
The wireless sensor network (WSN) has becomes the research area in today’s worlds due to the huge number of application taking the advantage from it. Sensors are small device having memory, power and processing chip that makes it... more
    • by 
    •   4  
      AttacksChallengesSecurity MechanismWireless Sensor Network
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible... more
    • by 
    •   9  
      SecurityPeer-to-PeerP2p(peer-2-Peer) NetworksPhysical Therapy
MANET is a rapidly emerging mobile communication technology which offers fruitful services in various fields like military battle field, emergency services, entertainment, sensor networks, home and internetworking etc., Due to dynamic... more
    • by 
    • Attacks
Almost every night, lasers pointed at an aircraft/ATC tower can lead to hazards. Especially, during critical phases of flight such as approach, landing and takeoff. Laser beam can cause distraction, or glare or temporary flash... more
    • by 
    •   12  
      LaserRisk assessmentAir traffic controlLasers
L’exercice de l’art infirmier répond à des règles réglementaires qui sont d’ordre public. Ceci implique qu’elles sont directement opposables à l’infirmier et ne souffrent pas d’exception. Néanmoins, en situation d’exception, ces règles... more
    • by 
    •   14  
      Crisis ManagementNurse EducationDisaster ManagementHealth Care Management
Web application brings us convenience but also has some potential security problems. SQL injection attacks topped the list of Top 10 Network Security Problems released by OWASP, and the detection technology of SQL injection attacks has... more
    • by 
    •   8  
      EngineeringComputer SciencePhysicsCybersecurity
This paper analyzes vulnerabilities of the SSL/TLS Handshake protocol, which is responsible for authentication of the parties in the communication and negotiation of security parameters that will be used to protect confidentiality and... more
    • by  and +1
    •   2  
      AttacksSSL/TLS Protocols
Web application attacks are incessantly increasing in number and in severity. The big data available on the internet motivates hackers to launch new kind of attacks. In this context, intensive research on web application security have... more
    • by 
    •   3  
      CybersecurityAttacksSQL Injection Attacks (SQLIAs)
In the recent era where technology plays a prominent role, persons can be identified (for security reasons) based on their behavioral and physiological characteristics (for example fingerprint, face, iris, key-stroke, signature, voice,... more
    • by 
    •   8  
      SecurityClassificationFeature ExtractionAttacks
Internet of Things (IoT) is the interconnection of heterogeneous smart devices through the Internet with diverse application areas. The huge number of smart devices and the complexity of networks has made it impossible to secure the data... more
    • by 
    •   5  
      ArchitectureSecurityIntrusion Detection SystemsInternet of Things (IoT)
Closed Circuit TeleVision surveillance systems are frequently the subject of debate. Some parties seek to promote their benefits such as their use in criminal investigations and providing a feeling of safety to the public. They have also... more
    • by 
    •   5  
      Criminal InvestigationsAttacksSurveillance SystemsIntrusiveness
    • by 
    •   20  
      Computer ScienceDistributed ComputingInformation SecurityPrivacy
In today's period of the invasive figuring, the Internet has turned into the principle method of information correspondence. In such a situation, giving security to information turns into a mind boggling assignment. In Elliptic bend... more
    • by 
    •   4  
      Elliptic curvesECCAttacksDiffie-Hellman-DSA
Web application attacks are incessantly increasing in number and in severity. The big data available on the internet motivates hackers to launch new kind of attacks. In this context, intensive research on web application security have... more
    • by  and +1
    •   3  
      CybersecurityAttacksSQL Injection Attacks (SQLIAs)
Since the Red Army’s invasion of Afghanistan in 1979, the world has been shaken by jihadist terrorism. In forty years, Islamist terrorist attacks have multiplied, reaching as far as the heart of Western countries, New York, Madrid,... more
    • by 
    •   5  
      TerrorismIslamIslamismAttacks
Smart contracts have a piece of code which are executed under certain conditions and are deployed on blockchain. Some of the applications of smart contracts are crypto assets, Health care applications, voting, IOT, digital rights,... more
    • by 
    •   4  
      AttacksVulnerabilitiesEthereumSmart Contracts
Today with the vast technological advancements in the various means of communication, instant messaging applications play a very crucial role in the transmission of messages from one user to another who will be residing at different... more
    • by 
    •   4  
      EncryptionChatbotAttacksPolitical Messages
we will investigate an assortment of cyber-attacks and diverse security strategies. We try to make an investigation into the branch of knowledge. This paper investigates how cybercrime has become a genuine danger in our lives and we will... more
    • by  and +2
    •   19  
      CyberlawCyberpsychologyCybercrimesCybernetics
Web application brings us convenience but also has some potential security problems. SQL injection attacks topped the list of Top 10 Network Security Problems released by OWASP, and the detection technology of SQL injection attacks has... more
    • by 
    •   5  
      EngineeringCybersecurityPhysical sciencesAttacks
Social engineering attacks are phenomena that are equally applicable to both the physical world and cyberspace. These attacks in the physical world have been studied for a much longer time than their counterpart in cyberspace. This... more
    • by 
    •   5  
      CyberpsychologyHuman FactorsSocial EngineeringCyber Security
The Presentation contains slides about web server security and was used for the presentation for Network Security class in IIIT-B.
    • by 
    •   18  
      Information SystemsInformation TechnologyInformation SecurityNetwork Security
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these... more
    • by  and +1
    •   19  
      Information SecurityPrivacyNetwork SecurityInternational Security
Currently, companies are more into using distributed systems and relying on network and communication facilities for transmitting critical and important information that needs to be secured. Therefore, protecting companies information... more
    • by 
    •   5  
      Information SecurityNetwork SecurityCyber SecurityInternet of Things (IoT)
This paper offers an up-to-date, comprehensive, extensive and targeted survey on Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our aim is to help interested researchers to effectively grasp the... more
    • by 
    •   8  
      Machine LearningSurvey ResearchBiometrics Authentication TechnologiesMobile Security
With the rapid growth in technology there is a need to increase security measures to take security system at next level. Cyber security is of developing concern to every single person, as information technology has become all too common.... more
    • by 
    •   5  
      Information SecurityBiometricFingerprintAttacks
Security in this world of digital computing plays a typical role, since all the operations are automated and large volumes of data are being maintained in the servers. Cloud computing is one of the evolving technologies where a huge... more
    • by 
    •   8  
      Computer ScienceInformation SecurityComputer NetworksComputer Security
The concept of damage control (DC) is based on a sequential therapeutic strategy that favors physiological restoration over anatomical repair in patients presenting acutely with hemorrhagic trauma. Initially described as damage control... more
    • by  and +1
    •   14  
      Emergency MedicineSurgeryDisaster risk managementDisaster Management
Security is one of the key important factors in ad hoc network due to the open wireless medium and dynamic topology of the network. MANET, VANET and FANET are type of ad hoc network and their applications are served the end users in real... more
    • by 
    •   4  
      Vanet SecurityVANETsVehicular Ad-hoc Communication (VANET)Attacks
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency and other added services.... more
    • by 
    •   4  
      PrivacySecurityVANETsAttacks
In today's digital world, in every field there is massive use of digital contents. Digital documents can be copied and scattered easily to large numbers of people without any cost. People can download audio, image and video files, and... more
    • by 
    •   5  
      Image ProcessingWatermarkingApplicationsTechniques
Social Network is a network where a set of individuals, groups or organizations interact and communicate, explore the social relationships and diagrammatically represented as a Graph. Social Networking Service is the service where... more
    • by  and +2
    •   11  
      Social NetworkingSocial ComputingCloud ComputingSocial Engineering
The following article intends to examine the role Boko Haram has been playing over the years. Based on the analysis of the news randomly taken from the Nigerian media, it seeks to offer suggestions on how the media and other Nigerian... more
    • by 
    •   4  
      MediaNigeriaBoko HaramAttacks
Wireless Sensor Networks are special kind of Ad-hoc networks, used in various applications like military and healthcare areas and characterized by severely constrained computational, memory and energy resources. When wireless sensor... more
    • by 
    •   8  
      Information SecuritySecurityWireless Sensor NetworksComputer Security
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile devices. It examines the implications of end-user behavior towards mitigating the risks posed by using mobile devices for online services and... more
    • by 
    •   8  
      Information SecurityData MiningComputer SecuritySocial Engineering
Government of Cabo Delgado produced a report about the impact of the insurgency in the province. The violence started in October 2017 when a group of 30 masked men launched attacks over three days against police posts in Mocímboa da... more
    • by 
    •   5  
      MozambiqueInsurgencyIslamic StateAttacks
Cyber security refers to protection of a network, system and web application or a website from an attacker who tries to gain access unethically. There are two types of cyber security, offensive and defensive. Due to the increase in... more
    • by 
    •   5  
      HackersCyber SecurityCyber CrimesAttacks
Throughout the world, every field has obtained a drastic transformation. The ultimate reason is digital technologies. This change made better performances of individual, industries, government, private organizations etc. Even this... more
    • by 
    •   4  
      HackersCyber ThreatsAttacksDigital Transformation
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide in the past few years, so does the need for effective security mechanisms. The sensing technology combined with processing power and... more
    • by 
    •   4  
      SecurityWireless Sensor NetworksThreatsAttacks
The recent form of change in working on resources and platform introduced the term virtualization. Virtualization comes with its own merits and challenges. As it hides physical characteristics of the resources and the concept of... more
    • by 
    •   6  
      Computer ScienceComputer EngineeringVirtualizationAttacks
Security is an important issue in the actual educational context where e-learning increases in popularity and increasingly more people are taking online courses. The e-learning platforms are today production systems that need to be... more
    • by 
    •   5  
      EducationE-learningMOODLESecurity
    • by 
    •   10  
      ComedyComics StudiesLaughterOratory
Security in computer networks has become a critical point for many organizations, but keeping data integrity demands time and large economic investments, in consequence there has been several solution approaches between hardware and... more
    • by  and +3
    •   7  
      Computer ScienceInformation SecurityData MiningSecurity
Since last-decade, smart-phones have gained widespread usage. Mobile devices store personal details such as contacts and text messages. Due to this extensive growth, smart-phones are attracted towards cyber-criminals. In this research... more
    • by 
    •   5  
      Static AnalysisMalwareDynamic AnalysisAttacks
Driven in part by federal law, accessibility (a11y) support for disabled users is becoming ubiquitous in commodity OSs. Some assistive technologies such as natural language user interfaces in mobile devices are welcomed by the general... more
    • by 
    •   6  
      Computer ScienceInformation SecurityAccessibilityAssistive Technology
Cyber security refers to protection of a network, system and web application or a website from an attacker who tries to gain access unethically. There are two types of cyber security, offensive and defensive. Due to the increase in... more
    • by 
    •   5  
      HackersCyber SecurityCyber CrimesAttacks
Blockchain technology is the key for decentralized society and gathered a lot of attention in recent times. The technology of Blockchain offers an infrastructure of secure network that allows the users to perform any operation without... more
    • by 
    •   4  
      BitcoinAttacksBlockchainsElliptic Curve Digital Signature Algorithm (ECDSA)
Negli ultimi anni, l’Italia non è stata colpita da attacchi terroristici di matrice jihadista, né ha sperimentato gli elevati livelli di radicalizzazione di alcuni dei suoi vicini europei. Significativamente, il numero di foreign fighters... more
    • by 
    •   89  
      SociologyPolitical SociologyInternational RelationsVisual propaganda
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible... more
    • by 
    •   6  
      SecurityPhysical TherapyWireless Sensor Networks (WSN)Detection
Wireless Sensor networks consists of hundreds or thousands of low cost, low power and self-organizing nodes which are highly distributed. Due to the reason that the sensor nodes are highly distributed, there is a need of security in the... more
    • by 
    •   6  
      Information SecuritySecurityWireless Sensor NetworksComputer Security
One of the most promising and exciting areas of communication technology is Vehicular Ad Hoc Networks (VANETs). It enables vehicles to communicate among and between each other and fixed infrastructures, and, to provide a safe and... more
    • by 
    •   5  
      SecurityInformationVANETsBlackholes