Code injection attacks in wireless-based Internet of Things (IoT): A comprehensive review and practical implementations
HA Noman, OMF Abu-Sharkh - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) has transformed various domains in our lives by enabling
seamless communication and data exchange between interconnected devices …
seamless communication and data exchange between interconnected devices …
Enhancing cyber-resiliency of DER-based smart grid: A survey
The rapid development of information and communications technology has enabled the use
of digital-controlled and software-driven distributed energy resources (DERs) to improve the …
of digital-controlled and software-driven distributed energy resources (DERs) to improve the …
BlockFW--Towards Blockchain-based Rule-Sharing Firewall
Central-managed security mechanisms are often utilized in many organizations, but such
server is also a security breaking point. This is because the server has the authority for all …
server is also a security breaking point. This is because the server has the authority for all …
Vulnerability Assessment and Penetration Testing on Student Service Center System
K Isnaini, MH Asyari, SF Amrillah… - ILKOM Jurnal …, 2024 - jurnal.fikom.umi.ac.id
The number of system breaches has recently increased across various sectors, including the
education sector. These breaches are carried out through various methods such as SQL …
education sector. These breaches are carried out through various methods such as SQL …
A novel container attacks data set for intrusion detection
HB Oğur - 2022 - open.metu.edu.tr
Recent years have witnessed a rapid increase in the use of the cloud, and especially the
container technology, which is very convenient to use in the cloud environment due to its …
container technology, which is very convenient to use in the cloud environment due to its …
Vulnerability Analysis and Effectiveness of OWASP ZAP and Arachni on Web Security Systems
The importance of using a security scanner to find web application weaknesses before they
are released is very beneficial for the continuity of an organization. In this study, we analyze …
are released is very beneficial for the continuity of an organization. In this study, we analyze …
Web Security Using Cryptography: An Empirical Review
CV Kwatra, G Kaur, BO Meher, P Litesh, KYN Kumar… - Kilby, 2023 - papers.ssrn.com
In today's digital world, when online transactions and the sharing of sensitive information are
becoming more prevalent, website security is essential. Due to its ability to encrypt and …
becoming more prevalent, website security is essential. Due to its ability to encrypt and …