By: B. Gupta The exponential development in technology has caused the whole planet to go digital.…
Category: Cyber Security & Network Forensics
Threats in Online Gaming
By: M. Sai, Z. Zhou, P. Do Online gaming attacks are referred to as malevolent efforts…
Malware Attacks Against Smartphone Devices
By: G. Praneeth, K. Psannis, K. T.Chui After computers and the Internet, smartphones became the third…
15 Most Popular Books for Online Social Networks (OSNs) Research
By: S. Sahoo Security and Trust in Online Social Networks Barbara Carminati; Elena Ferrari; Marco Viviani, 2013 Publisher: Morgan…
Cognitive Computing for Intelligent Internet-of-Things (IIoT) Environment
By: A. Dahiya IoT and big data analytics have paved the way for modern intelligent services…
Digital Forensics Techniques for Social Media Networking
By: Ivan Cvitić, G. Praneeth, D. Peraković Industry 4.0 and Web 2.0 advances have made social…
Cloud Forensics: Open Issues, Challenges and Future Research Opportunities
By: Praneeth Due to the apparent resource, cost-effectiveness, widespread, and fluidity of nature, the application of…
DIGITAL FORENSICS IN SOCIAL NETWORKING
Industry 4.0 and Web 2.0 advances have made social networking acceptable and common place in many…
Big Data: The Part and Parcel of Today’s Digital World
By: Mamta In today’s digital world, we can connect with billions of people around the globe,…
Leverage Technology Convergence to Provision High-Quality Next-Generation Services
By: S. Mendhurwar Today’s customers expect a wide range of innovative services at their fingertips. For…
DOM-based Cross-Site Scripting Attack
By: Pooja XSS attack can be classified into 3 main categories: Stored, Reflected and, DOM-based XSS…
On the Security of Blockchain-based Solutions: Principles and Challenges
By: Megha Owning to the long-standing challenges across the digital information ecosystem, emerging concepts like Blockchain…
Security in the Process of Industrial Evolution: An Industry 4.0 Perspective
By: Megha Over the last few years, Information Technology (IT) systems have witnessed remarkable progress. The…
CONSUMER DATA PROTECTION IN CLOUD AND IOT NETWORKS
By: Praneeth Internet of Things (IoT) incorporates several resources into systems that deliver complex and smart…
What is Cross-Site Scripting (XSS) Worm?
By: Pooja XSS worm, also known as the XSS virus, is the malicious scripting code crafted…
Is a Website vulnerable to XSS attack? Checking for XSS Vulnerability…
By: B. Gupta It is an easy task to identify if a web site is vulnerable…
Cross Site Scripting (XSS) Attacks
By: Pooja In this article, we are going to briefly describe the fundamental concepts of the…
Game Theory for Cyber Security during COVID-19 Pandemic: A Holistic Approach
By: Amrita Network or Internet security is constantly a matter of discussion and concern for security…
Top 10 Journals/Conferences in the Field of Computer Science & Cryptography
By: K. Psannis ACM Symposium on Computer and Communications Security H5- index 94 H5-median 162 IEEE…
Deep Learning for Forensics and Anti-Forensics
By: D. Peraković Nowadays, due to the development in the field of modern digital technologies, most…