Phish What You Wish

P Gadient, P Gerig, O Nierstrasz… - 2021 IEEE 21st …, 2021 - ieeexplore.ieee.org
IT professionals have no simple tool to create phishing websites and raise the awareness of
users. We developed a prototype that can dynamically mimic websites by using enriched …

An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol

GR Vijay, ARM Reddy - International Journal of Computer …, 2021 - inderscienceonline.com
Cloud service providers need to have elevated level of security than local system users, as
users outsource their data to a remote system relying on its genuineness and also data has …

A Comprehensive Analysis on Encryption/Decryption Techniques for IoT Attack Avoidance

A Rani, P Singh - Proceedings of the Second International Conference …, 2021 - Springer
This paper illustrates the methodologies and techniques used in IoT in order to prevent the
systems from various kinds of attacks. Cybersecurity demands several encryption/decryption …