fingerprint authentication
Category: Cyber Security & Network Forensics
Biometric Spoof Detection
BY: Rishika Yatishwar Gaur Things are evolving fastly towards a password-free world. This leads to excessively…
What is Mobile Phishing and How to Detect it?
By: A. Khan, K. T. Chui Smart phones play a significant role in our lives, because…
Intelligent Advancement Technology in Cyber Security
By: U. Yadav Technological advances endanger cybersecurity. Indeed, the latest developments in defense practitioners’ defensive techniques…
Green HPC’s : New-Generation Solution For Decreasing Energy Consumption Of HPC Systems
By: Kriti Aggarwal, Sudhakar Kumar High performance computing (HPC) evolved as result of growing demand for…
Role of Robotics Engineering in Entrepreneurship
By: A. Dahiya, K. Psannis Drastic changes are being noticed in the technological field due to…
Brain Computer Interface Technology
By: A. Sethi, K. Yadav, Konstantinos Psannis The working of the human brain has often intrigued…
Computer Security
By: A. Sethi, K. T. Chui, K. Yadav, A. A. El-Latif As technology has advanced, so…
XSS Research Directions
By: Pooja Indeed, there exists multitude of research work in the field of XSS attack detection…
XSS Prevention Measures
By: Pooja XSS is possible due to the improper input filtering that eases the process of…
Network Coding: A Multi-Faceted Enabler for Next-Generation Wireless Networks!
By: V. Adat The fifth-generation and beyond (B5G) networks and services are being characterized by strict…
Integration of Cloud and Fog Computing for Energy Efficient and Scalable Services
By: A. Dahiya Cloud computing has caught the eye of both users and service providers as…
Quantum Computing: A Threat for Information Security or Boon to Classical Computing?
By: Megha Quamara Information technologies are advancing for more than a century – with the advent…
Enhanced Privacy Recommendations According to GDPR in the Context of Internet-of-Things (IoT)
By: S. Rizou and K. E. Psannis The Internet of Things (IoT) is considered to be…
10 Most Popular Books on Internet-of-Things (IoT) Security and Privacy Issues
By: Pooja Practical Internet of Things SecurityBrian Russell and Drew Van DurenPackt publishing Securing the internet…
Biometric Template Security
By: V. S. Baghel and S. Prakash Biometrics refers to an individual’s physiological and behavioral features,…
Security in 5G Wireless Communication Technologies
By: A. Khan, K. T. Chui, C. Hsu Acquiring a weltanschauung conceived by Admiral Arleigh Burke from World War…
Cheating in Online Gaming
By: I. Cvitić, M. Sai, D. Peraković Cheating is simply another method of acquiring resources that…
Fuzzing
By: M. Sai, F. J. Penalvo Fuzzing is a widely used automated software testing technique that…