BYOD: Current state and security challenges

M Eslahi, MV Naseri, H Hashim… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
Recently, BYOD or Bring Your own Device has become one of the most popular models for
enterprises to provide mobility and flexibility in workplaces. The emergence of new …

A botnets circumspection: The current threat landscape, and what we know so far

EC Ogu, OA Ojesanmi, O Awodele, S Kuyoro - Information, 2019 - mdpi.com
Botnets have carved a niche in contemporary networking and cybersecurity due to the
impact of their operations. The botnet threat continues to evolve and adapt to …

A data collection approach for Mobile Botnet analysis and detection

M Eslahi, MR Rostami, H Hashim… - … IEEE symposium on …, 2014 - ieeexplore.ieee.org
Recently, MoBots or Mobile Botnets have become one of the most critical challenges in
mobile communication and cyber security. The integration of Mobile devices with the Internet …

Mobile device users' susceptibility to phishing attacks

FL Sylvester - arXiv preprint arXiv:2203.01823, 2022 - arxiv.org
The mobile device is one of the fasted growing technologies that is widely used in a
diversifying sector. Mobile devices are used for everyday life, such as personal information …

Fast-flux botnet detection based on traffic response and search engines credit worthiness

D Cafuta, V Sruk, I Dodig - Tehnički vjesnik, 2018 - hrcak.srce.hr
Sažetak Botnets are considered as the primary threats on the Internet and there have been
many research efforts to detect and mitigate them. Today, Botnet uses a DNS technique fast …

A New Approximation Algorithm for Minimum-Weight –Connected Dominating Set

J Zhou, Y Ran, PM Pardalos, Z Zhang… - INFORMS Journal …, 2024 - pubsonline.informs.org
Consider a graph with nonnegative node weight. A vertex subset is called a CDS
(connected dominating set) if every other node has at least one neighbor in the subset and …

Yüksek dereceden momentler ve entropiye dayalı bulanık portföy optimizasyonu

O Pala - 2019 - search.proquest.com
Portföy seçim problemi her dönem finansın ve yatırımın önemli bir konusu olmuştur.
Problemin özü, belirli krkerler ve kısıtlamalar ile en iyi portföyü bulabilmektir.(OKrterer ve …

[PDF][PDF] An efficient connected dominating set algorithm in WSNs based on the induced tree of the crossed cube

J Zhang, SM Zhou, L Xu, W Wu, X Ye - International Journal of Applied …, 2015 - sciendo.com
The connected dominating set (CDS) has become a well-known approach for constructing a
virtual backbone in wireless sensor networks. Then traffic can forwarded by the virtual …

OYUN TEORİSİ YAKLAŞIMI İLE PORTFÖY OPTİMİZASYONU ÜZERİNE LİTERATÜR DEĞERLENDİRMESİ

M Pekkaya, FH Gümüş - Uluslararası Yönetim İktisat ve İşletme …, 2021 - dergipark.org.tr
Günümüzde portföy optimizasyon problemi kesin çözülmemiş olup hala güncelliğini
korumaktadır. Oyun teorisi ise psikoloji, felsefe, tarım, matematik, mühendislik, ekonomi gibi …

Tools, techniques & analysis of botnet

GS Tanwar, V Goar - Proceedings of the 2014 International Conference …, 2014 - dl.acm.org
The term botnet stands for robot in the internet environment. The botnet operates in
collection of computers by performing malicious activity. It is basically installed in the …