Email Security Issues, Tools, and Techniques Used in Investigation

E Altulaihan, A Alismail, MM Hafizur Rahman… - Sustainability, 2023 - mdpi.com
The email system is a globally distributed communication infrastructure service that involves
multiple actors playing different roles to ensure end-to-end mail delivery. It is an …

[PDF][PDF] 云应用程序编程接口安全研究综述: 威胁与防护

陈真, 乞文超, 贺鹏飞, 刘林林, 申利民 - 电子与信息学报, 2023 - jeit.ac.cn
云时代, 云应用程序编程接口(API) 是服务交付, 能力复制和数据输出的最佳载体. 然而, 云API
在开放服务和数据的同时, 增加了暴露面和攻击面, 攻击者通过数据劫持和流量分析等技术获取 …

[HTML][HTML] Bandwidth and power efficient lightweight authentication scheme for healthcare systeme☆☆☆☆☆☆

SU Jan, A Ghani, A Alzahrani, SM Saqlain… - Journal of King Saud …, 2023 - Elsevier
With the emergence of the Internet of Things (IoT) and the rapid advancement in sensor
technology, wireless medical sensor networks (WMSNs) have become increasingly …

[PDF][PDF] Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.

M Zha, J Wang, Y Nan, X Wang, Y Zhang, Z Yang - NDSS, 2022 - ndss-symposium.org
Team Chat (TACT) systems are now widely used for online collaborations and project
management. A unique feature of these systems is their integration of third-party apps, which …

Performance and security comparison of json web tokens (jwt) and platform agnostic security tokens (paseto) on restful apis

AF Nugraha, H Kabetta, IKS Buana… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
This research aims to compare the performance and security between Json Web Token
(JWT) and Platform Agnostic Security Tokens (PASETO) on RESTful API. Performance is …

A two-layer IP hopping-based moving target defense approach to enhancing the security of mobile ad-hoc networks

P Wang, M Zhou, Z Ding - Sensors, 2021 - mdpi.com
Mobile ad-hoc networks (MANETs) have great potential applications in military missions or
emergency rescue due to their no-infrastructure, self-organizing and multi hop capability …

Salt Hash Password Using MD5 Combination for Dictionary Attack Protection

A Nugroho, T Mantoro - 2023 6th International Conference of …, 2023 - ieeexplore.ieee.org
Using MD5 hashing of passwords in web logins is highly vulnerable to dictionary attacks.
One online application for cracking hashed passwords using a dictionary attack that is free …

The intelligent offense and defense mechanism of internet of vehicles based on the differential game-IP hopping

Y He, M Zhang, X Yang, QT Sun, J Luo, Y Yu - IEEE Access, 2020 - ieeexplore.ieee.org
The Road Side Unit (RSU) is an important part of the Internet of Vehicles (IoV), which
collects a large number of user's privacy information and connects vehicles to the Internet …

[图书][B] Studi Komparasi Metode Entropy dan Metode ROC Sebagai Penentu Bobot Kriteria SPK

CE Prawiro, MYH Setyawan, SF Pane - 2020 - books.google.com
Pada Buku Ini membahas tentang Perbandingan antara metode Entropy dan Metode ROC
dalam menentukan bobot kriteria yang di gunakan pada Sistem pendukung keputusan …

[PDF][PDF] Adaptive Hiding Algorithm Based on Mapping Database.

IAS Jabbar, SH Shaker - Int. J. Interact. Mob. Technol., 2023 - researchgate.net
Information hiding one of the important field of security which provide secure level for the
information. Achieving multi levels of security system often researchers used cryptography …