Data Forensics For Cyber Crime Investigation

By: B. Gupta The exponential development in technology has caused the whole planet to go digital.…

Threats in Online Gaming

By: M. Sai, Z. Zhou, P. Do Online gaming attacks are referred to as malevolent efforts…

Malware Attacks Against Smartphone Devices

By: G. Praneeth, K. Psannis, K. T.Chui After computers and the Internet, smartphones became the third…

15 Most Popular Books for Online Social Networks (OSNs) Research

By: S. Sahoo Security and Trust in Online Social Networks Barbara Carminati; Elena Ferrari; Marco Viviani, 2013 Publisher: Morgan…

Cognitive Computing for Intelligent Internet-of-Things (IIoT) Environment

By: A. Dahiya IoT and big data analytics have paved the way for modern intelligent services…

Digital Forensics Techniques for Social Media Networking

By: Ivan Cvitić, G. Praneeth, D. Peraković Industry 4.0 and Web 2.0 advances have made social…

Cloud Forensics: Open Issues, Challenges and Future Research Opportunities

By: Praneeth Due to the apparent resource, cost-effectiveness, widespread, and fluidity of nature, the application of…

DIGITAL FORENSICS IN SOCIAL NETWORKING

Industry 4.0 and Web 2.0 advances have made social networking acceptable and common place in many…

Big Data: The Part and Parcel of Today’s Digital World

By: Mamta In today’s digital world, we can connect with billions of people around the globe,…

Leverage Technology Convergence to Provision High-Quality Next-Generation Services

By: S. Mendhurwar Today’s customers expect a wide range of innovative services at their fingertips. For…

DOM-based Cross-Site Scripting Attack

By: Pooja XSS attack can be classified into 3 main categories: Stored, Reflected and, DOM-based XSS…

On the Security of Blockchain-based Solutions: Principles and Challenges

By: Megha Owning to the long-standing challenges across the digital information ecosystem, emerging concepts like Blockchain…

Security in the Process of Industrial Evolution: An Industry 4.0 Perspective

By: Megha Over the last few years, Information Technology (IT) systems have witnessed remarkable progress. The…

CONSUMER DATA PROTECTION IN CLOUD AND IOT NETWORKS

By: Praneeth Internet of Things (IoT) incorporates several resources into systems that deliver complex and smart…

What is Cross-Site Scripting (XSS) Worm?

By: Pooja XSS worm, also known as the XSS virus, is the malicious scripting code crafted…

Is a Website vulnerable to XSS attack? Checking for XSS Vulnerability…

By: B. Gupta It is an easy task to identify if a web site is vulnerable…

Cross Site Scripting (XSS) Attacks

By: Pooja In this article, we are going to briefly describe the fundamental concepts of the…

Game Theory for Cyber Security during COVID-19 Pandemic: A Holistic Approach

By: Amrita Network or Internet security is constantly a matter of discussion and concern for security…

Top 10 Journals/Conferences in the Field of Computer Science & Cryptography

By: K. Psannis ACM Symposium on Computer and Communications Security      H5- index  94 H5-median 162 IEEE…

Deep Learning for Forensics and Anti-Forensics

By: D. Peraković Nowadays, due to the development in the field of modern digital technologies, most…