Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking

MB Muzammil, M Bilal, S Ajmal, SC Shongwe… - IEEE …, 2024 - ieeexplore.ieee.org
The current era extensively utilizes the Internet, which uses data. Due to the apparent open-
access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by …

IoT security vulnerabilities and defensive measures in Industry 4.0

K Manasa, LMI Leo Joseph - Artificial Intelligence and Cyber Security in …, 2023 - Springer
Abstract The Internet of things (IoT) has been emerging technology for the past decade. IoT
can be defined as the network connecting objects to the Internet in the physical world. IoT …

An IOT based system for monitoring environmental and physiological conditions

C Santhanakrishnan, K Annapurani, R Singh… - Materials Today …, 2021 - Elsevier
Nowadays, the significant progress in technological sector's growth is at its peak high and so
the widening of internet to everything that include sensors and specifically the term IOT …