|
|
|
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ...
ver más
|
|
|
|
|
|
Hao Sun, Yuejin Du and Qi Li
Amid the incessant evolution of the Internet, an array of cybersecurity threats has surged at an unprecedented rate. A notable antagonist within this plethora of attacks is the SQL injection assault, a prevalent form of Internet attack that poses a signi...
ver más
|
|
|
|
|
|
Vishnu Priya Biyyapu, Sastry Kodanda Rama Jammalamadaka, Sasi Bhanu Jammalamadaka, Bhupati Chokara, Bala Krishna Kamesh Duvvuri and Raja Rao Budaraju
The main channel for disseminating information is now the Internet. Users have different expectations for the calibre of websites regarding the posted and presented content. The website?s quality is influenced by up to 120 factors, each represented by tw...
ver más
|
|
|
|
|
|
Subhan Ullah, Zahid Mahmood, Nabeel Ali, Tahir Ahmad and Attaullah Buriro
The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In this p...
ver más
|
|
|
|
|
|
Navruz Madibragimov
Pág. 79 - 86
Today, computational linguistics of the Tajik language is at the origin of its development. In order to develop this area, the author of this article is developing a project for the formalization of inflections of the Tajik language for computer morpholo...
ver más
|
|
|