SecureC2Edit: A Framework for Secure Collaborative and Concurrent Document Editing

S Arora, PK Atrey - IEEE Transactions on Dependable and …, 2023 - ieeexplore.ieee.org
Cloud-based online document editing services, such as Google Docs and Office 365,
provide an inexpensive and efficient means of managing documents. However, storing data …

Network traffic virtualization using wireshark and google maps

S Arvind, S Arvind, VK Silveri, G Potey… - 2023 International …, 2023 - ieeexplore.ieee.org
Security analysts have the knowledge necessary to identify the types of traffic that are
present in a network, identify instances of abnormally high traffic, and identify the network …

Effectiveness of Wireshark Tool for Detecting Attacks and Vulnerabilities in Network Traffic

NAL Mabsali, H Jassim, J Mani - 1st International Conference on …, 2023 - atlantis-press.com
Due to the popularity of using the technology, network security plays a crucial role recently
which supports to establish strong systems that work against cyberattacks. Furthermore, the …

The Case for Validating ADDIE Model as a Digital Forensic Model for Peer-to-Peer Network Investigation

AS Musa, IU Awan, F Zahrah - Information Systems Frontiers, 2022 - Springer
Rapid technological advancement can substantially impact the processes of digital forensic
investigation and present a myriad of challenges to the investigator. With these challenges, it …

Analysis of UDP Traffic norms through packet sniffing on peer-to-peer networks

A Musa - ATBU Journal of Science, Technology and Education, 2020 - atbuftejoste.com.ng
A significant obstacle with current peer-to-peer (p2p) traffic monitoring and analysis involves
the large number of newly emerging p2p applications possessing more intricate …

Efficacy of ADDIE Model in Peer-to-Peer Networks: Digital Evidence Investigation

AS Musa, IU Awan, I Abobaker - 2021 8th International …, 2021 - ieeexplore.ieee.org
While the need for content distribution proliferates-becoming more mammoth and complex
on the Internet-the P2P network perseveres as one of the best avenues to service the …

Packet tracing and analysis of TCP Traffic on Transport Layer of peer to peer networks

A Musa - ATBU Journal of Science, Technology and Education, 2020 - atbuftejoste.com.ng
Abstract Peer Networks (P2P) is presenting a lot of fascinating capabilities to the internet
since its inception, which has made and is still making it gather so much interest. As a result …

[图书][B] Frameworks for Secure Collaborative and Concurrent Editing

S Arora - 2022 - search.proquest.com
Cloud-based online document editing services, such as Google Docs and Office 365,
provide an inexpensive and efficient means of managing documents. However, storing data …

T-AES-and ECC-Based Secure Data Communication in Peer-to-Peer Networks

M Kumar, KS Jadon, N Gupta - International Conference on Wireless …, 2023 - Springer
Presently, data security is the biggest concern, and every organization wants to secure their
data. Data can be shared using peer-to-peer (P2P) networks among multiple nodes; …

A Framework for Digital Investigation of Peer-to-Peer (P2P) Networks. An Investigation into the Security Challenges and Vulnerabilities of Peer-to-Peer Networks and …

AS Musa - 2022 - bradscholars.brad.ac.uk
Peer-to-Peer (P2P) Networks have been presenting many fascinating capabilities to the
internet since their inception, which has made and is still gathering so much interest. As a …