Users' privacy and security concerns that affect IoT adoption in the home domain

F Schuster, A Habibipour - International Journal of Human …, 2024 - Taylor & Francis
Internet of things (IoT) technology must provide users with benefits that outweigh the costs
and risks for it to be widely accepted and adopted. New functionality is continuously added …

Raspberry pi-based intelligent cyber defense systems for SMEs and smart-homes: An exploratory study

SS Tirumala, N Nepal, SK Ray - EAI Endorsed Transactions on …, 2022 - publications.eai.eu
Ongoing ransomware attacks have forced business to think about security of their resources.
Recently, small-to-medium enterprises (SMEs) and Smart-homes have become easy targets …

Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach

MZ Khan, M Shoaib, MS Husain, K Ul Nisa… - Journal of Cloud …, 2024 - Springer
Cloud computing is a new paradigm in this new cyber era. Nowadays, most organizations
are showing more reliability in this environment. The increasing reliability of the Cloud also …

[PDF][PDF] JOURNAL OF NORTHEASTERN UNIVERSITY

MDPPIN INDIAN, FPSU ISM - Journal of Northeastern University, 2022 - dbdxxb.cn
India is considered to be among the leading global food producers of the world. The supply
chain involved in the sector is extremely long and complex and has a lot of participating …

[PDF][PDF] System Penetration: Concepts, Attack Methods, and Defense Strategies

MT Quasim, AN Al Hawi, M Meraj - 2023 - easychair.org
Penetration testing has become an integral part of a comprehensive security program. Pen
tests are conducted by ethical hackers to mimic the strategies and actions of the attacker …

Cyber Threat Migration: Perpetuating in the Healthcare Sector and Agriculture and Food Industries

MA Usmani, KA Usmani, A Kaleem… - Advances in Cyberology …, 2023 - igi-global.com
Abstract 'Globalization,''industrialization,''cyber connectivity,''digitalization,'and 'e-
commerce'are not fantasy words in today's era. They all amalgamated towards the growth …

Recent Advances in Cyber Security Laws and Practices in India: Implementation and Awareness

N Malik, F Husain, A Ali, YA Elahi - … in Cyberology and the Advent of …, 2023 - igi-global.com
The growth of the internet and proliferation of applications, products, and services has given
rise to cyber threats which require far more stringent security measures than ever before …

[PDF][PDF] Analysis of Cyber Forensics Issues in Internet of Things (IoT)

M Meraj - EasyChair. Available online: https://easychair. org …, 2022 - easychair.org
Non-traditional computer devices, such as mechanical and Internet of Things (IoT) devices,
may communicate data across a network without human or machine involvement. Because …

[PDF][PDF] Techniques for Detecting and Preventing IP Sniffing Amplification Attacks

MT Quasim, MA Alasiri - 2023 - easychair.org
Sniffing attack in context of network security, corresponds to theft or interception of data by
capturing the network traffic using a packet sniffer (an application aimed at capturing …

[PDF][PDF] Forensics Analysis Issues in the Internet of Things (IoT)

AK Gaurav - 2023 - easychair.org
Continuous hardware miniaturization and increased energy efficiency make it possible to
integrate intelligence into ordinary devices. This trend of increasing so-called non-smart …