Location-based information has become an attractive attribute for use in many services including localization, tracking, positioning, and authentication. An additional layer of …
A Raich, V Gadicha - International Conference on Cyber Warfare, Security …, 2021 - Springer
Cloud deployments face large scale attacks due to improper access control and authentication vulnerabilities. This allows attackers to inject improper information into the …