There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will …
SQL injection attack is considered one of the most dangerous vulnerabilities exploited to leak sensitive information, gain unauthorized access, and cause financial loss to individuals …
This study presents the current state of research on multi-factor authentication. Authentication is one of the important traits in the security domain as it ensures that …
AA Alqarni - Journal of Cyber Security and Mobility, 2022 - journals.riverpublishers.com
Cloud computing is considered as technical advancement in information technology. Many organizations have been motivated by this advancement to outsource their data and …
The rapid growth and uptake of network-based communication technologies have made cybersecurity a significant challenge as the number of cyber-attacks is also increasing. A …
Uncommon observations that significantly vary from the norm are referred to as outliers. Outlier detection, which aims to detect unexpected behavior, is a critical topic that has …
NA Khan - International Journal of Computer Networks and …, 2022 - ischolar.sscldl.in
The rapid growth of interconnected networks and devices inevitably causes the rise of traffic demand and thus pushes the technologies like long-term evolution-Advanced (LTE-A) and …
NA Khan, MY Alzaharani, HA Kar - International Journal of …, 2020 - researchgate.net
With the development and rapid growth in IT infrastructure, malicious code attacks are considered as the main threat to cybersecurity. Malicious JavaScript's which are intentionally …