[PDF][PDF] Assessment of existing cyber-attack detection models for web-based systems

OG Awuor - Global Journal of Engineering and Technology …, 2023 - gjeta.com
In the current technological environment, different entities engage in intricate cyber security
approaches in order to counter damages and disruptions in web-based systems. The design …

Techniques and protocols for enhancing data privacy in cloud computing: A review

M Otieno - World Journal of Advanced Engineering Technology …, 2023 - wjaets.com
The emergence of cloud computing has enabled millions of devices across the globe to
communicate and exchange massive amounts of data that is classified as private with each …

[PDF][PDF] A survey on security challenges in the current MANET routing protocols

FC Korir, W Cheruiyot - Global Journal of Engineering and …, 2022 - academia.edu
Wireless communication employs radio technology to facilitate data transmission without
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …

[PDF][PDF] An extensive survey of smart agriculture technologies: Current security posture

M Otieno - World J. Adv. Res. Rev, 2023 - researchgate.net
Smart agriculture, enabled by advanced technologies such as internet of things, artificial
intelligence and data analytics, offers immense potential for optimizing farming practices and …

iVFAS: An Improved Vehicle-to-Fog Authentication System for Secure and Efficient Fog-based Road Condition Monitoring

AK Yadav, M Shojofar, A Braeken - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Road condition monitoring schemes allow a severe reduction of traffic queues and
drastically improve road safety. In these schemes, authorized vehicles communicate the …

[PDF][PDF] Federated learning and differential privacy in clinical health: Extensive survey

D Odera - World Journal of Advanced Engineering Technology …, 2023 - wjaets.com
Federated Learning (FL) is concept that has been adopted in medical field to analyze data in
individual devices through aggregation of machine learning model in global server. It also …

[PDF][PDF] A taxonomical survey of 5G and 6G security and privacy issues

JE Ounza - Glob. J. Eng. Technol. Adv, 2023 - gjeta.com
Extensive research has been done on 5G and 6G security challenges. It has been shown
that these challenges have the potential of affecting cross board 5G and 6G ecosystems …

Security challenges in cloud computing: A comprehensive analysis

JJ Ang'udi - World Journal of Advanced Engineering Technology …, 2023 - wjaets.com
The security issues surrounding cloud computing, a quickly developing technology that is
now essential to both personal and business computing, are thoroughly examined in this …

Security risks in the software development lifecycle: A review

D Odera, M Otieno, JE Ounza - World Journal of Advanced Engineering …, 2023 - wjaets.com
Software security is one of the most critical concerns in modern software development,
especially in safety-critical systems whose failure can lead to environmental damage …

Safeguarding the future: A comprehensive analysis of security measures for smart grids

SA Wasumwa - World Journal of Advanced Research and Reviews, 2023 - wjarr.com
With the rapid advancement of technology and the growing reliance on renewable energy
sources, smart grids have emerged as a transformative solution for enhancing the efficiency …