BY: DHANANJAY SINGH CAPTCHA stands for “Completely Automated Public Turing test to tell Computers and Humans…
Category: Cyber Security & Network Forensics
Phishing Attack in Modern World
By: R. S. Pal While the size and sophistication of cybersecurity threats continue to rise, social…
Top 50 Cyber Security Tools for IT and Business Professionals in 2022
By: A. Khan, D. Peraković In this technological era, cyber security tools and technologies play a…
Biometric Fingerprint Authentication: Challenges and Future Research Directions
fingerprint authentication
Biometric Spoof Detection
BY: Rishika Yatishwar Gaur Things are evolving fastly towards a password-free world. This leads to excessively…
What is Mobile Phishing and How to Detect it?
By: A. Khan, K. T. Chui Smart phones play a significant role in our lives, because…
Intelligent Advancement Technology in Cyber Security
By: U. Yadav Technological advances endanger cybersecurity. Indeed, the latest developments in defense practitioners’ defensive techniques…
Green HPC’s : New-Generation Solution For Decreasing Energy Consumption Of HPC Systems
By: Kriti Aggarwal, Sudhakar Kumar High performance computing (HPC) evolved as result of growing demand for…
Role of Robotics Engineering in Entrepreneurship
By: A. Dahiya, K. Psannis Drastic changes are being noticed in the technological field due to…
Brain Computer Interface Technology
By: A. Sethi, K. Yadav, Konstantinos Psannis The working of the human brain has often intrigued…
Computer Security
By: A. Sethi, K. T. Chui, K. Yadav, A. A. El-Latif As technology has advanced, so…
XSS Research Directions
By: Pooja Indeed, there exists multitude of research work in the field of XSS attack detection…
XSS Prevention Measures
By: Pooja XSS is possible due to the improper input filtering that eases the process of…
Network Coding: A Multi-Faceted Enabler for Next-Generation Wireless Networks!
By: V. Adat The fifth-generation and beyond (B5G) networks and services are being characterized by strict…
Edge Intelligence: A New Emerging Era
Edge Intelligence: A New Emerging Era
Integration of Cloud and Fog Computing for Energy Efficient and Scalable Services
By: A. Dahiya Cloud computing has caught the eye of both users and service providers as…
Quantum Computing: A Threat for Information Security or Boon to Classical Computing?
By: Megha Quamara Information technologies are advancing for more than a century – with the advent…
Enhanced Privacy Recommendations According to GDPR in the Context of Internet-of-Things (IoT)
By: S. Rizou and K. E. Psannis The Internet of Things (IoT) is considered to be…
10 Most Popular Books on Internet-of-Things (IoT) Security and Privacy Issues
By: Pooja Practical Internet of Things SecurityBrian Russell and Drew Van DurenPackt publishing Securing the internet…
Biometric Template Security
By: V. S. Baghel and S. Prakash Biometrics refers to an individual’s physiological and behavioral features,…