Blockchain and Artificial Intelligence for Industrial Automation

By: A. Dahiya Blockchain technology is growing at a rapid pace every day, and can be…

Brain Computer Interface Technology

By: A. Sethi, K. Yadav, Konstantinos Psannis The working of the human brain has often intrigued…

Computer Security

By: A. Sethi, K. T. Chui, K. Yadav, A. A. El-Latif As technology has advanced, so…

XSS Research Directions

By: Pooja Indeed, there exists multitude of research work in the field of XSS attack detection…

Internet-of-Medical-Things (IoMT): An Unexplored Dimension in Healthcare

By: A. Dahiya,  K. Psannis The IoT is undeniably changing the healthcare business by reconfiguring devices and…

XSS Prevention Measures

By: Pooja XSS is possible due to the improper input filtering that eases the process of…

Network Coding: A Multi-Faceted Enabler for Next-Generation Wireless Networks!

By: V. Adat The fifth-generation and beyond (B5G) networks and services are being characterized by strict…

Edge Intelligence: A New Emerging Era

Edge Intelligence: A New Emerging Era

Integration of Cloud and Fog Computing for Energy Efficient and Scalable Services

By: A. Dahiya Cloud computing has caught the eye of both users and service providers as…

Quantum Computing: A Threat for Information Security or Boon to Classical Computing?

By: Megha Quamara Information technologies are advancing for more than a century – with the advent…

Enhanced Privacy Recommendations According to GDPR in the Context of Internet-of-Things (IoT)

By: S. Rizou and K. E. Psannis The Internet of Things (IoT) is considered to be…

10 Most Popular Books on Internet-of-Things (IoT) Security and Privacy Issues

By: Pooja Practical Internet of Things SecurityBrian Russell and Drew Van DurenPackt publishing Securing the internet…

Biometric Template Security

By: V. S. Baghel and S. Prakash Biometrics refers to an individual’s physiological and behavioral features,…

10 Most Popular Books on Internet-of-Things (IoT)

By: Pooja The Internet of ThingsSamuel GreengardThe MIT press Getting Started with the Internet of Things:…

Security in 5G Wireless Communication Technologies

By: A. Khan, K. T. Chui, C. Hsu Acquiring a weltanschauung conceived by Admiral Arleigh Burke from World War…

Cheating in Online Gaming

By: I. Cvitić,  M. Sai, D.  Peraković Cheating is simply another method of acquiring resources that…

Fuzzing

By: M. Sai, F. J. Penalvo Fuzzing is a widely used automated software testing technique that…

Data Forensics For Cyber Crime Investigation

By: B. Gupta The exponential development in technology has caused the whole planet to go digital.…

Threats in Online Gaming

By: M. Sai, Z. Zhou, P. Do Online gaming attacks are referred to as malevolent efforts…

Malware Attacks Against Smartphone Devices

By: G. Praneeth, K. Psannis, K. T.Chui After computers and the Internet, smartphones became the third…