[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way Forward

I Makhdoom, M Abolhasan, J Lipman, N Shariati… - IEEE …, 2024 - ieeexplore.ieee.org
The current age is witnessing an unprecedented dependence on data originating from
humans through the devices that comprise the Internet of Things. The data collected by …

[PDF][PDF] Enhancing web security through comprehensive evaluation of sql injection detection models

A Jimoh, MK Ahmed, S Salihu, B Mod, MN Salihu - Development, 2024 - toknowpress.net
In the realm of cybersecurity, safeguarding web applications against SQLi attacks is
important; it remains a severe threat to web security, necessitating robust detection methods …

Stegovideo: An Efficient Mechanism for Securing Video Data Using Steganography and Cryptography Techniques

O Ojo, M Kareem, O Oyinloye, O Ikumpayi - Journal of Science and …, 2024 - ajol.info
The COVID-19 pandemic episodes have rapidly expanded multimedia systems utilization
across the globe. Nowadays, practically all companies and educational systems rely …

A Comprehensive Analysis on Online Masquerade Attacks

BV Raghav, NS Sree, S Parnitha… - … on Applied Artificial …, 2024 - ieeexplore.ieee.org
With the growth of remote work and online collaboration tools, virtual meetings are
becoming more and more common in today's digital environment. Virtual meetings are …

[PDF][PDF] Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way Forward

D FRANKLIN, M PICCARDI - researchgate.net
The current age is witnessing an unprecedented dependence on data originating from
humans through the devices that comprise the Internet of Things. The data collected by …