[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way Forward
The current age is witnessing an unprecedented dependence on data originating from
humans through the devices that comprise the Internet of Things. The data collected by …
humans through the devices that comprise the Internet of Things. The data collected by …
[PDF][PDF] Enhancing web security through comprehensive evaluation of sql injection detection models
In the realm of cybersecurity, safeguarding web applications against SQLi attacks is
important; it remains a severe threat to web security, necessitating robust detection methods …
important; it remains a severe threat to web security, necessitating robust detection methods …
Stegovideo: An Efficient Mechanism for Securing Video Data Using Steganography and Cryptography Techniques
The COVID-19 pandemic episodes have rapidly expanded multimedia systems utilization
across the globe. Nowadays, practically all companies and educational systems rely …
across the globe. Nowadays, practically all companies and educational systems rely …
A Comprehensive Analysis on Online Masquerade Attacks
BV Raghav, NS Sree, S Parnitha… - … on Applied Artificial …, 2024 - ieeexplore.ieee.org
With the growth of remote work and online collaboration tools, virtual meetings are
becoming more and more common in today's digital environment. Virtual meetings are …
becoming more and more common in today's digital environment. Virtual meetings are …
[PDF][PDF] Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way Forward
D FRANKLIN, M PICCARDI - researchgate.net
The current age is witnessing an unprecedented dependence on data originating from
humans through the devices that comprise the Internet of Things. The data collected by …
humans through the devices that comprise the Internet of Things. The data collected by …