Phishing attacks are one of the most common initial access vectors malicious actors utilize to get into personal and corporate systems. the weakest component of a system in terms of security is the human user, which i...
详细信息
Cloud computing has been critical to the world's modern technological growth. Cloud computing is one of the most advantageous solutions to digital challenges. security is a major concern in cloud computing technol...
详细信息
the core of a blockchain network is its consensus algorithm. Starting withthe Proof-of-Work, there have been various versions of consensus algorithms, such as Proof-of-Stake (PoS), Proof-of-Authority (PoA), and Pract...
详细信息
this systematic review seeks to evaluate the impact of CyRIS in ascertaining accurate implementation of projects with a primary focus on the merits of its functionalities. Core to the study is the view that CyRIS-driv...
详细信息
A central element of blockchain networks is immutability, which enables each participant to have a precise global record of all transactions. In permissioned blockchain networks, where validators are selected from a t...
详细信息
Internet of things (IoT) networks are growing significantly as a modern communication technology that changes the world tremendously, and the vulnerabilities of IoT have brought many cyber attacks. Botnet attacks are ...
详细信息
Recently, the number of accidents resulting in irreparable damages like death has risen due to the increased number of vehicles worldwide. Vehicular ad hoc network (VANET) is a new technology for enhancing road safety...
详细信息
Wireless sensor networks (WSNs) are composed of small sensory nodes with limited energy that are deployed in large numbers in order to monitor a physical event in the area to be watched. these nodes have been built to...
详细信息
the need for a low-power reliable form of communication is ever-present in a multitude of fields. Our paper aims to develop and explore a security-oriented application of LoRa-based hop-to-hop communication, which pro...
详细信息
Peer-to-peer botnets have evolved to be one of the biggest threats to network security due to their use as the foundation for several cybercrimes. the problem of detecting P2P botnets entails extra difficulties, even ...
详细信息
暂无评论