Background Data security has been a critical topic of research and discussion since the onset of data sharing in e-health systems. Although digitalization of data has increased …
DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information age. Knowledge is derived from having access to information. The ability to gather …
The need for networking in smart industries known as Industry 5.0 has grown critical, and it is especially important for the security and privacy of the applications. To counter threats to …
The past few decades have recorded increases in the development of new technologies. These technologies, such as the smart phone, computers, and social network sensors, have …
The expand trend of cloud data mobility led to malicious data threats that necessitate using data protection techniques. Most cloud system applications contain valuable and …
S Anawar, DL Kunasegaran, MZ Mas'ud… - J Eng Sci …, 2019 - jestec.taylors.edu.my
Employee is frequently referred to as the weakest link in the cyber security in an organization. Differences in the employees' personality makes it hard for any organization to …
F Janjua, A Masood, H Abbas, I Rashid… - Future Generation …, 2021 - Elsevier
Insider threats are one of the most challenging and growing security threats which the government agencies, organizations, and institutions face. In such scenarios, malicious (red) …
R Punithavathi, M Kowsigan… - … Systems Science & …, 2022 - cdn.techscience.cn
At present, health care applications, government services, and banking applications use big data with cloud storage to process and implement data. Data mobility in cloud environments …
A Jony, ASM Miah, MN Islam - 2023 International Conference …, 2023 - ieeexplore.ieee.org
Nowadays, the DHCP starvation attack is a crucial attack that denied the services for the legitimate network user where the attacker mainly occupies all the IP addresses in the …