[PDF][PDF] Evaluating the Effectiveness of Cybersecurity Protocols in SAP System Upgrades
This paper investigates the effectiveness of cybersecurity protocols during SAP system
upgrades, focusing on both administrative and technical perspectives. As SAP systems are …
upgrades, focusing on both administrative and technical perspectives. As SAP systems are …
Secure and privacy improved cloud user authentication in biometric multimodal multi fusion using blockchain-based lightweight deep instance-based DetectNet
S Poomalai, K Venkatesan, S Subbaraj… - … : Computation in Neural …, 2024 - Taylor & Francis
This research introduces an innovative solution addressing the challenge of user
authentication in cloud-based systems, emphasizing heightened security and privacy. The …
authentication in cloud-based systems, emphasizing heightened security and privacy. The …
A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism
V Papaspirou, I Kantzavelou, Y Yigit… - Proceedings of the 19th …, 2024 - dl.acm.org
The evolution of authentication mechanisms in ensuring secure access to systems has been
crucial for mitigating vulnerabilities and enhancing system security. However, despite …
crucial for mitigating vulnerabilities and enhancing system security. However, despite …
[PDF][PDF] Advancing user classification models: A comparative analysis of machine learning approaches to enhance faculty password policies at the University of Buraimi
B Shannaq, O Ali, S Al Maqbali… - Journal of Infrastructure …, 2024 - researchgate.net
In this paper, we assess the results of experiment with different machine learning algorithms
for the data classification on the basis of accuracy, precision, recall and F1-Score metrics …
for the data classification on the basis of accuracy, precision, recall and F1-Score metrics …
Security Considerations in Generative AI for Web Applications
SR Sindiramutty, KRV Prabagaran… - … With Generative AI …, 2025 - igi-global.com
Protecting AI in web applications is necessary. This domain is a composite of technology
and huge scope with good prospects and immense difficulties. This chapter covers the …
and huge scope with good prospects and immense difficulties. This chapter covers the …
Wireless local area network security and modern cryptographic protocols: WEP & WPA1/2/3
I Despotopoulos - 2024 - polynoe.lib.uniwa.gr
Modern wireless local area networks (WLAN) and the cryptographic protocols on which they
are constructed, based on the IEEE 802.11 protocol, including WEP-WPA1/2/3 Personal as …
are constructed, based on the IEEE 802.11 protocol, including WEP-WPA1/2/3 Personal as …
A QR Identification System with SMS Notification Implementing Secure Hash Algorithm 256 (SHA-256)
RCM Sy, MPM Sy, JN Abucejo… - 2023 International …, 2023 - ieeexplore.ieee.org
The system for identification in most universities and campuses of manual checking of
identification cards is prone to fault and less secured. The aim of this study was to integrate …
identification cards is prone to fault and less secured. The aim of this study was to integrate …