Life Cycle Assessment of Vulnerability and Penetration Testing on Systems and Proactive Action Taken to Resolve Possible Attacks on Networks
V Kannika Sherly - International Journal of Management …, 2023 - papers.ssrn.com
After getting the vulnerability list of the victim, the attacker make a plan for the possible
attack. With that list attacker exploit the victim's network or system and compromise his …
attack. With that list attacker exploit the victim's network or system and compromise his …
Examination of Some Foremost Security Concerns of Contemporary Cloud Computing Environments
RA Chauhan - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Cloud computing diminishes cost and complexity of service providers by means of assets
and operational costs. It allows users to access applications tenuously. On behalf of user …
and operational costs. It allows users to access applications tenuously. On behalf of user …
Utilization of Possible Security and Privacy Issues Considering the Component Interaction in High Speed Communication Networks
RA Chauhan - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Abstract The Internet of Things (IoT), an evolutionary technology that raised and gained
huge scope in the science and engineering applications solving problems without the …
huge scope in the science and engineering applications solving problems without the …
[PDF][PDF] Design and Development of an Online Bakery Website for Enhanced Customer Experience
T Shynu - Central Asian Journal of Mathematical Theory and …, 2024 - researchgate.net
Swiss Bakery is a digital paradise where the delightful aroma of freshly baked goods meets
the convenience of online shopping. Our virtual bakery is a sanctuary for pastry lovers …
the convenience of online shopping. Our virtual bakery is a sanctuary for pastry lovers …
Mitigating the Vulnerabilities for the Larger Infrastructures and Smaller Attention to the Cyber Security Threats in Large Scale Networks
RA Chauhan - International Journal of Management, Technology …, 2023 - papers.ssrn.com
We have seen the development and demand for seamless interconnectivity of smart devices
to provide various functionality and abilities to users. Nevertheless, we also know the …
to provide various functionality and abilities to users. Nevertheless, we also know the …
Highly Reliable Intrusion Detection Model as a Predictive Framework for Network Data Traffic Analysis in Wireless Networks
RA Chauhan - International Journal of Management, Technology …, 2023 - papers.ssrn.com
It has become an important model in various applications such as education, business and
others. So security of the data that is communicated through internet is necessary. Secure …
others. So security of the data that is communicated through internet is necessary. Secure …
An Enhanced Context Graph Based Framework to Provide a Reliable Strategy for Enhancing Network Security
RA Chauhan - International Journal of Management, Technology …, 2023 - papers.ssrn.com
A common firmware makes it easier to control and manage various IoT devices without
many overheads. Common software platforms allow easy configurations as well as easy …
many overheads. Common software platforms allow easy configurations as well as easy …
Formulating a Complex Solution to Secure Data in Information Systems for Supply Chain Management
V Kannika Sherly - International Journal of Management …, 2023 - papers.ssrn.com
To successfully integrate business processes between suppliers and customers,
manufacturers must solve the complex problem of information security. IoT is defined as a …
manufacturers must solve the complex problem of information security. IoT is defined as a …
[PDF][PDF] Building a Scalable Serverless Weather Application Using AWS Lambda, API Gateway, and DynamoDB
S Manimaran, SR Saranya… - Central Asian Journal …, 2024 - researchgate.net
This paper demonstrates how to build a scalable and cost-effective serverless weather
application using Amazon Web Services (AWS). By leveraging the power of AWS Lambda …
application using Amazon Web Services (AWS). By leveraging the power of AWS Lambda …
An Efficient Scheme for Securing Data Warehouses in the Cloud by Reducing Overhead While Enforcing Data Privacy
V Kannika Sherly - International Journal of Management …, 2022 - papers.ssrn.com
In cloud computing schemes, Infrastructure as a Service represents a cloud computing
technology that delivers computing resources, networking, and storage to consumers on …
technology that delivers computing resources, networking, and storage to consumers on …