XSS Prevention Measures

By: Pooja XSS is possible due to the improper input filtering that eases the process of…

Network Coding: A Multi-Faceted Enabler for Next-Generation Wireless Networks!

By: V. Adat The fifth-generation and beyond (B5G) networks and services are being characterized by strict…

Edge Intelligence: A New Emerging Era

Edge Intelligence: A New Emerging Era

Integration of Cloud and Fog Computing for Energy Efficient and Scalable Services

By: A. Dahiya Cloud computing has caught the eye of both users and service providers as…

Quantum Computing: A Threat for Information Security or Boon to Classical Computing?

By: Megha Quamara Information technologies are advancing for more than a century – with the advent…

Enhanced Privacy Recommendations According to GDPR in the Context of Internet-of-Things (IoT)

By: S. Rizou and K. E. Psannis The Internet of Things (IoT) is considered to be…

10 Most Popular Books on Internet-of-Things (IoT) Security and Privacy Issues

By: Pooja Practical Internet of Things SecurityBrian Russell and Drew Van DurenPackt publishing Securing the internet…

Biometric Template Security

By: V. S. Baghel and S. Prakash Biometrics refers to an individual’s physiological and behavioral features,…

10 Most Popular Books on Internet-of-Things (IoT)

By: Pooja The Internet of ThingsSamuel GreengardThe MIT press Getting Started with the Internet of Things:…

Security in 5G Wireless Communication Technologies

By: A. Khan, K. T. Chui, C. Hsu Acquiring a weltanschauung conceived by Admiral Arleigh Burke from World War…

Cheating in Online Gaming

By: I. Cvitić,  M. Sai, D.  Peraković Cheating is simply another method of acquiring resources that…

Fuzzing

By: M. Sai, F. J. Penalvo Fuzzing is a widely used automated software testing technique that…

Data Forensics For Cyber Crime Investigation

By: B. Gupta The exponential development in technology has caused the whole planet to go digital.…

Threats in Online Gaming

By: M. Sai, Z. Zhou, P. Do Online gaming attacks are referred to as malevolent efforts…

Malware Attacks Against Smartphone Devices

By: G. Praneeth, K. Psannis, K. T.Chui After computers and the Internet, smartphones became the third…

15 Most Popular Books for Online Social Networks (OSNs) Research

By: S. Sahoo Security and Trust in Online Social Networks Barbara Carminati; Elena Ferrari; Marco Viviani, 2013 Publisher: Morgan…

Cognitive Computing for Intelligent Internet-of-Things (IIoT) Environment

By: A. Dahiya IoT and big data analytics have paved the way for modern intelligent services…

Digital Forensics Techniques for Social Media Networking

By: Ivan Cvitić, G. Praneeth, D. Peraković Industry 4.0 and Web 2.0 advances have made social…

Cloud Forensics: Open Issues, Challenges and Future Research Opportunities

By: Praneeth Due to the apparent resource, cost-effectiveness, widespread, and fluidity of nature, the application of…

15 Most Popular Books on Deep Learning in 2021

By: K. Yadav Deep Learning Ian Goodfellow, Yoshua Bengio and Aaron Ian Goodfellow, Yoshua Bengio and…