Design and implementation of a security analysis tool that detects and eliminates code caves in windows applications

HA Noman, Q Al-Maatouk… - … Conference on Data …, 2021 - ieeexplore.ieee.org
Process injection techniques on Windows appli-cations are considered a serious threat to
software security specialists. The attackers use these techniques to exploit the targeted …

Status update on phishing emails awareness: Jordanian case

M Qasaimeh, H Al-Manaseer, H Al-Manaseer… - The 7th International …, 2021 - dl.acm.org
This study is a response to the rapid proliferation of high-risk phishing emails, representing
one of the most dangerous cybercrimes and the primary medium for the deception of online …

Vulnerability Analysis of Wireless LAN Networks using ISSAF WLAN Security Assessment Methodology: A Case Study of Restaurant in East Jakarta

JA Pratama, A Almaarif… - 2021 4th International …, 2021 - ieeexplore.ieee.org
Nowadays the use of Wi-Fi has been widely used in public places, such as in restaurants.
The use of Wi-Fi in public places has a very large security vulnerability because it is used by …

Estado del arte utilizando mapeo sistemático de seguridad de redes domésticas WIFI en familias ecuatorianas

CV Maza Gonzalez, FG Rochina Manobanda - 2021 - dspace.ups.edu.ec
El presente artículo tiene como objetivo construir un estado de arte utilizando mapeo
sistemático sobre la seguridad de redes domesticas Wi-Fi. El documento propuesto …

Introducing IJam Wireless De-authentication Attack Tool

H Al-Ani, A Al-Zubidy - Proceedings of the SouthEast Conference, 2017 - dl.acm.org
Wi-Fi is a ubiquitous medium; more devices are increasingly using this ubiquitous medium
nowadays. For that reason, the importance of Wi-Fi security is increasing as well. Attackers …

[引用][C] Forensic Readiness for Wireless Medical Systems: Designing for User Safety

AK Kyaw - 2019 - Auckland University of Technology