A Comprehensive Review of Wireless Security Protocols and Encryption Applications

HN Thakur, A Al Hayajneh, K Thakur… - 2023 IEEE World AI …, 2023 - ieeexplore.ieee.org
The evolution of technology has made our lives more convenient, allowing us to
communicate with anyone across the globe, access data whenever we need it, and connect …

Social engineering incidents and preventions

A Kamruzzaman, K Thakur, S Ismat… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
Social Engineering is a technique used to obtain information through tactics using
persuasion, intimidation, coercion, extortion, or blackmail. Social engineers study human …

Challenges of cyber security and the emerging trends

ML Ali, K Thakur, B Atobatele - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
In the field of technology, cybersecurity has a significant role, and the security data become
one between the most critical problems faced in today's world. When there is discussion …

Network packet sniffing and defense

ML Ali, S Ismat, K Thakur… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
A person sits comfortably at home and enjoys the convenience brought by the internet,
enjoys online shopping, receives emails from friends or close acquaintances, and handles …

Top Reported Data Security Risks in the Age of COVID-19

S Schmeelk, K Thakur, ML Ali… - 2021 IEEE 12th …, 2021 - ieeexplore.ieee.org
Data has been collected and stored for thousands of years. Securing data during the digital
age has remained difficult. Research shows that in 2018 there was over 33 zettabytes of …

[PDF][PDF] Threats and Emerging Developments in Cyber Security.

M Murugesan, P Balamurugan, J Santhosh… - …, 2020 - pdfs.semanticscholar.org
Cyber security plays a significant role in science. Data or information security is one of the
crucial issues facing the world, when there is discussion about the rapidly growing …

[PDF][PDF] Intrusion Detection System in Cloud Computing: A

O Awodele Simon, S Wilson, W Sakpere - 3rd International Conference …, 2022 - lcu.edu.ng
With greater flexibility and less infrastructure investment, cloud computing offers end
customers scalable, virtualised on-demand services. These services are offered via the …

Cloud Computing Security Threats And Solutions

S Henry, ML ALI - i-manager's Journal on Cloud Computing, 2017 - search.proquest.com
The continued evolution of technology has led to a vast virtualized network of unlimited
possibilities; cloud computing. Cloud computing is an internet based service that offers cloud …