Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

A review of biometric technology along with trends and prospects

JA Unar, WC Seng, A Abbasi - Pattern recognition, 2014 - Elsevier
Identity management through biometrics offer potential advantages over knowledge and
possession based methods. A wide variety of biometric modalities have been tested so far …

Smartphone and smartwatch-based biometrics using activities of daily living

GM Weiss, K Yoneda, T Hayajneh - Ieee Access, 2019 - ieeexplore.ieee.org
Smartphones and smartwatches, which include powerful sensors, provide a readily
available platform for implementing and deploying mobile motion-based behavioral …

Securing internet of medical things systems: Limitations, issues and recommendations

JPA Yaacoub, M Noura, HN Noura, O Salman… - Future Generation …, 2020 - Elsevier
Traditional health-care systems suffer from new challenges associated with the constant
increase in the number of patients. In order to address this issue, and to increase the …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

Evolution, current challenges, and future possibilities in ECG biometrics

JR Pinto, JS Cardoso, A Lourenço - Ieee Access, 2018 - ieeexplore.ieee.org
Face and fingerprint are, currently, the most thoroughly explored biometric traits, promising
reliable recognition in diverse applications. Commercial products using these traits for …

Biometrics as a method of employee control

J Żywiołek, A Sarkar, MS Sial - 2022 16th International …, 2022 - ieeexplore.ieee.org
Biometric technology is used for various purposes. One of these is the identification of
individuals. It has been widely used in the field of life for various applications. Despite the …

Utilising VAPT Technologies (Vulnerability Assessment & Penetration Testing) as a Method for Actively Preventing Cyberattacks

VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Complexity of systems are increasing day by day. This leads to more and more
vulnerabilities in Systems. Attackers use these vulnerabilities to exploit the victim's system. It …

An optimal hybrid solution to local and global facial recognition through machine learning

K Raju, B Chinna Rao, K Saikumar… - A fusion of artificial …, 2022 - Springer
Face recognition need is fine assured as enormous industrial relevance use them to
implement one or another objective. As the programmes move closer to everyday usage to …

Matching contactless and contact-based conventional fingerprint images for biometrics identification

C Lin, A Kumar - IEEE Transactions on Image Processing, 2018 - ieeexplore.ieee.org
Vast databases of billions of contact-based fingerprints have been developed to protect
national borders and support e-governance programs. Emerging contactless fingerprint …