The Consequences of Integrity Attacks on E-Governance: Privacy and Security Violation

M Hussain, MSH Talpur, M Humayun - Cybersecurity Measures for E …, 2022 - igi-global.com
With the development of new advanced technology, people's expectations and grievances
of improving services and values in all aspects of life are growing. Changes in technology …

The Internet of Things (IoT) Is Revolutionizing Inventory Management

IA Shah, A Sial, SN Brohi - … Cyber Threats and Cybersecurity in the …, 2024 - igi-global.com
Every part of the supply chain has been affected by the rise of Industry 4.0 technologies.
Many businesses have been trying out this modern technology to see if it can help them …

Designing Module to Perform Fast Light Block Cipher (LBC) within microcontrollers by VHDL

A Badr - The International Journal for …, 2022 - modernacademy-journal.synceg.net
Nowadays, various wireless communication sensors, detectors and controllers (such as low-
end IoT) are used all over the world. They are vulnerable to the threat of hackers and …

Wearable Device Security Threat Analysis and Response Plan

SH Han - Convergence Security Journal, 2024 - koreascience.kr
With the development of IoT technology, wearable services have also developed rapidly.
Wearable devices required for this service are used as sensors and controllers in the form of …