Users' privacy and security concerns that affect IoT adoption in the home domain
F Schuster, A Habibipour - International Journal of Human …, 2024 - Taylor & Francis
Internet of things (IoT) technology must provide users with benefits that outweigh the costs
and risks for it to be widely accepted and adopted. New functionality is continuously added …
and risks for it to be widely accepted and adopted. New functionality is continuously added …
Raspberry pi-based intelligent cyber defense systems for SMEs and smart-homes: An exploratory study
SS Tirumala, N Nepal, SK Ray - EAI Endorsed Transactions on …, 2022 - publications.eai.eu
Ongoing ransomware attacks have forced business to think about security of their resources.
Recently, small-to-medium enterprises (SMEs) and Smart-homes have become easy targets …
Recently, small-to-medium enterprises (SMEs) and Smart-homes have become easy targets …
Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach
Cloud computing is a new paradigm in this new cyber era. Nowadays, most organizations
are showing more reliability in this environment. The increasing reliability of the Cloud also …
are showing more reliability in this environment. The increasing reliability of the Cloud also …
[PDF][PDF] JOURNAL OF NORTHEASTERN UNIVERSITY
MDPPIN INDIAN, FPSU ISM - Journal of Northeastern University, 2022 - dbdxxb.cn
India is considered to be among the leading global food producers of the world. The supply
chain involved in the sector is extremely long and complex and has a lot of participating …
chain involved in the sector is extremely long and complex and has a lot of participating …
[PDF][PDF] System Penetration: Concepts, Attack Methods, and Defense Strategies
MT Quasim, AN Al Hawi, M Meraj - 2023 - easychair.org
Penetration testing has become an integral part of a comprehensive security program. Pen
tests are conducted by ethical hackers to mimic the strategies and actions of the attacker …
tests are conducted by ethical hackers to mimic the strategies and actions of the attacker …
Cyber Threat Migration: Perpetuating in the Healthcare Sector and Agriculture and Food Industries
MA Usmani, KA Usmani, A Kaleem… - Advances in Cyberology …, 2023 - igi-global.com
Abstract 'Globalization,''industrialization,''cyber connectivity,''digitalization,'and 'e-
commerce'are not fantasy words in today's era. They all amalgamated towards the growth …
commerce'are not fantasy words in today's era. They all amalgamated towards the growth …
Recent Advances in Cyber Security Laws and Practices in India: Implementation and Awareness
The growth of the internet and proliferation of applications, products, and services has given
rise to cyber threats which require far more stringent security measures than ever before …
rise to cyber threats which require far more stringent security measures than ever before …
[PDF][PDF] Analysis of Cyber Forensics Issues in Internet of Things (IoT)
M Meraj - EasyChair. Available online: https://easychair. org …, 2022 - easychair.org
Non-traditional computer devices, such as mechanical and Internet of Things (IoT) devices,
may communicate data across a network without human or machine involvement. Because …
may communicate data across a network without human or machine involvement. Because …
[PDF][PDF] Techniques for Detecting and Preventing IP Sniffing Amplification Attacks
MT Quasim, MA Alasiri - 2023 - easychair.org
Sniffing attack in context of network security, corresponds to theft or interception of data by
capturing the network traffic using a packet sniffer (an application aimed at capturing …
capturing the network traffic using a packet sniffer (an application aimed at capturing …
[PDF][PDF] Forensics Analysis Issues in the Internet of Things (IoT)
AK Gaurav - 2023 - easychair.org
Continuous hardware miniaturization and increased energy efficiency make it possible to
integrate intelligence into ordinary devices. This trend of increasing so-called non-smart …
integrate intelligence into ordinary devices. This trend of increasing so-called non-smart …