Cognitive Computing for Intelligent Internet-of-Things (IIoT) Environment

By: A. Dahiya IoT and big data analytics have paved the way for modern intelligent services…

Digital Forensics Techniques for Social Media Networking

By: Ivan Cvitić, G. Praneeth, D. Peraković Industry 4.0 and Web 2.0 advances have made social…

Cloud Forensics: Open Issues, Challenges and Future Research Opportunities

By: Praneeth Due to the apparent resource, cost-effectiveness, widespread, and fluidity of nature, the application of…

Big Data: The Part and Parcel of Today’s Digital World

By: Mamta In today’s digital world, we can connect with billions of people around the globe,…

Leverage Technology Convergence to Provision High-Quality Next-Generation Services

By: S. Mendhurwar Today’s customers expect a wide range of innovative services at their fingertips. For…

DOM-based Cross-Site Scripting Attack

By: Pooja XSS attack can be classified into 3 main categories: Stored, Reflected and, DOM-based XSS…

On the Security of Blockchain-based Solutions: Principles and Challenges

By: Megha Owning to the long-standing challenges across the digital information ecosystem, emerging concepts like Blockchain…

Security in the Process of Industrial Evolution: An Industry 4.0 Perspective

By: Megha Over the last few years, Information Technology (IT) systems have witnessed remarkable progress. The…

CONSUMER DATA PROTECTION IN CLOUD AND IOT NETWORKS

By: Praneeth Internet of Things (IoT) incorporates several resources into systems that deliver complex and smart…

What is Cross-Site Scripting (XSS) Worm?

By: Pooja XSS worm, also known as the XSS virus, is the malicious scripting code crafted…

Is a Website vulnerable to XSS attack? Checking for XSS Vulnerability…

By: B. Gupta It is an easy task to identify if a web site is vulnerable…

Cross Site Scripting (XSS) Attacks

By: Pooja In this article, we are going to briefly describe the fundamental concepts of the…

Game Theory for Cyber Security during COVID-19 Pandemic: A Holistic Approach

By: Amrita Network or Internet security is constantly a matter of discussion and concern for security…

Top 10 Journals/Conferences in the Field of Computer Science & Cryptography

By: K. Psannis ACM Symposium on Computer and Communications Security      H5- index  94 H5-median 162 IEEE…

Deep Learning for Forensics and Anti-Forensics

By: D. Peraković Nowadays, due to the development in the field of modern digital technologies, most…