Captcha Improvement: Security from DDoS Attack

BY: DHANANJAY SINGH CAPTCHA stands for “Completely Automated Public Turing test to tell Computers and Humans…

Phishing Attack in Modern World

By: R. S. Pal While the size and sophistication of cybersecurity threats continue to rise, social…

Top 50 Cyber Security Tools for IT and Business Professionals in 2022

By: A. Khan, D. Peraković In this technological era, cyber security tools and technologies play a…

Biometric Fingerprint Authentication: Challenges and Future Research Directions

fingerprint authentication

Biometric Spoof Detection

BY: Rishika Yatishwar Gaur Things are evolving fastly towards a password-free world. This leads to excessively…

What is Mobile Phishing and How to Detect it?

By: A. Khan, K. T. Chui Smart phones play a significant role in our lives, because…

Intelligent Advancement Technology in Cyber Security

By: U. Yadav Technological advances endanger cybersecurity. Indeed, the latest developments in defense practitioners’ defensive techniques…

Green HPC’s : New-Generation Solution For Decreasing Energy Consumption Of HPC Systems

By: Kriti Aggarwal, Sudhakar Kumar High performance computing (HPC) evolved as result of growing demand for…

Role of Robotics Engineering in Entrepreneurship

By: A. Dahiya, K. Psannis Drastic changes are being noticed in the technological field due to…

Brain Computer Interface Technology

By: A. Sethi, K. Yadav, Konstantinos Psannis The working of the human brain has often intrigued…

Computer Security

By: A. Sethi, K. T. Chui, K. Yadav, A. A. El-Latif As technology has advanced, so…

XSS Research Directions

By: Pooja Indeed, there exists multitude of research work in the field of XSS attack detection…

XSS Prevention Measures

By: Pooja XSS is possible due to the improper input filtering that eases the process of…

Network Coding: A Multi-Faceted Enabler for Next-Generation Wireless Networks!

By: V. Adat The fifth-generation and beyond (B5G) networks and services are being characterized by strict…

Edge Intelligence: A New Emerging Era

Edge Intelligence: A New Emerging Era

Integration of Cloud and Fog Computing for Energy Efficient and Scalable Services

By: A. Dahiya Cloud computing has caught the eye of both users and service providers as…

Quantum Computing: A Threat for Information Security or Boon to Classical Computing?

By: Megha Quamara Information technologies are advancing for more than a century – with the advent…

Enhanced Privacy Recommendations According to GDPR in the Context of Internet-of-Things (IoT)

By: S. Rizou and K. E. Psannis The Internet of Things (IoT) is considered to be…

10 Most Popular Books on Internet-of-Things (IoT) Security and Privacy Issues

By: Pooja Practical Internet of Things SecurityBrian Russell and Drew Van DurenPackt publishing Securing the internet…

Biometric Template Security

By: V. S. Baghel and S. Prakash Biometrics refers to an individual’s physiological and behavioral features,…