Electronic user authentication key for access to HMI/SCADA via unsecured internet networks

AT Abu-Jassar, H Attar, V Yevsieiev… - Computational …, 2022 - Wiley Online Library
This paper discusses the development of new hardware and software for protecting access
to HMI/SCADA systems via Unprotected Internet Networks (UPN), mainly when working …

Applications of cryptography in database: a review

H Xu, K Thakur, AS Kamruzzaman… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Cryptography is the foundation and core of network security. Privacy protection, sensitive
information is particularly important, so whether it is system development or app …

An evaluation of IoT DDoS cryptojacking malware and Mirai Botnet

A Borys, A Kamruzzaman, HN Thakur… - 2022 IEEE World AI …, 2022 - ieeexplore.ieee.org
This paper dives into the growing world of IoT botnets that have taken the world by storm in
the past five years. Though alone an IP camera cannot produce enough traffic to be …

Cybersecurity and prevention in the quantum era

A Dwivedi, GK Saini, UI Musa - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Emerging future technologies such as Quantum computer is a serious threat to the privacy
and security of user data and organizational security. The speed of outperforming classical …

Social engineering incidents and preventions

A Kamruzzaman, K Thakur, S Ismat… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
Social Engineering is a technique used to obtain information through tactics using
persuasion, intimidation, coercion, extortion, or blackmail. Social engineers study human …

Network packet sniffing and defense

ML Ali, S Ismat, K Thakur… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
A person sits comfortably at home and enjoys the convenience brought by the internet,
enjoys online shopping, receives emails from friends or close acquaintances, and handles …

Protection from a quantum computer cyber-attack: survey

JE Raya, AS Yahya, EK Ahmad - 2023 - techniumscience.com
Encryption is required to address the ongoing issue of information security within
communication networks. In the second part of the 20th century, quantum computing was …

Quantum communication based cyber security analysis using artificial intelligence with IoMT

H Han, J Yao, Y Wu, Y Dou, J Fu - Optical and Quantum Electronics, 2024 - Springer
Connected electronic devices used in healthcare, such as small sensors and actuators and
other cyber-physical devices, make up what is known as the Internet of Medical Things. By …

Using an Efficient Detection Method to Prevent Personal Data Leakage for Web‐Based Smart City Platforms

CC Chiu, PW Tsai, CS Yang - Wireless Communications and …, 2023 - Wiley Online Library
Many Internet of Things and information exchange technologies bring convenience, cost‐
efficiency, and sustainability to smart city solutions. These changes have improved our day …

Quantum computing standards & accounting information systems

M Lazirko - arXiv preprint arXiv:2311.11925, 2023 - arxiv.org
This research investigates the potential implications of quantum technology on accounting
information systems, and business overall. This endeavor focuses on the vulnerabilities of …