Quantum Cryptography Analysis For Threat Assessment

A Kapoor - Available at SSRN 4284366, 2022 - papers.ssrn.com
Today, the importance of information security makes the subject of cryptography a huge
topic of discussion. Math-based encryption has dominated the area of information security …

An Review-Smartphone and Tablet Cyberattack Threat Detection

A Kapoor - Available at SSRN 4430809, 2023 - papers.ssrn.com
It's hard to list all of the various ways or reasons cybercriminals may attack a cell phone and
its infrastructure. It could come in the form of intercepting communication to gain access to …

Cyber Threat vulnerability for Business Intelligence in Big Data

A Kapoor - Available at SSRN 4284374, 2022 - papers.ssrn.com
In today's digital era, the world is revolving around technologically coveted ideas and
techniques which can be transformed into business logics in corporate world. The entire …

Threat and vulnearbilty for Social Media Marketing

A Kapoor - Available at SSRN 4267948, 2022 - papers.ssrn.com
Like the oxygen we breathe, social media has become all-pervasive. People use Facebook,
Instagram, Twitter, and a variety of other platforms to connect with people across the world …

Analyzing Object Detection Algorithms for Cyber Threat Scenario

A Kapoor - Available at SSRN 4284372, 2022 - papers.ssrn.com
This study compares several object identification methods that employ convolutional neural
networks to conduct object detection in order to discover the greatest threat and feasible …

Opinion Mining Assessment For Threat Analysis

A Kapoor - Available at SSRN 4284375, 2022 - papers.ssrn.com
In this paper, we present a conclusion mining framework to distinguish item highlights and
conclusions from audit reports. The highlights and conclusions are removed utilizing …

Cloud Computing Threats Paradigms and Issues

A Kapoor - Available at SSRN 4284368, 2022 - papers.ssrn.com
Cloud Computing is the on demand availability of computer system resources, especially
data storage, computing power, collection of services with 24* 7 availability with 'all over …

A Evaluation Of Fault Resilience Methods In The Threat Of Cloud Computing

A Kapoor - Available at SSRN 4267940, 2022 - papers.ssrn.com
The term" cloud computing" refers to a way of doing computing where customers are given
access to information technology capabilities as a service through the Internet without …

Assessment Of Intrusion Monitoring Methods Using Digital Forensics In A Cloud Infrastructure

A Kapoor - Available at SSRN 4267941, 2022 - papers.ssrn.com
The cloud computing is the favoured option for all IT organisations since it offers its
consumers flexible, pay-per-use services. Due to its open and distributed nature, which …

Forecasting of Malware Taxonomy Using ML Classifiers

A Kapoor - Available at SSRN 4267945, 2022 - papers.ssrn.com
The global proliferation of vulnerability databases has both positive and negative effects.
They are known by malware researchers, representatives of the industry, and end users to …