|
|
|
Sana Rasheed and Soulla Louca
A national population census is instrumental in offering a holistic view of a country?s progress, directly influencing policy formulation and strategic planning. Potential flaws in the census system can have detrimental impacts on national development. O...
ver más
|
|
|
|
|
|
|
Zaher Salah and Esraa Abu Elsoud
The rise in internet users has brought with it the impending threat of cybercrime as the Internet of Things (IoT) increases and the introduction of 5G technologies continues to transform our digital world. It is now essential to protect communication net...
ver más
|
|
|
|
|
|
|
Tommy Nguyen, Garnet Yeates, Tony Ly and Umar Albalawi
With the recent increase in phishing attacks and other kinds of malicious activities, increasing the awareness of security and privacy awareness is arguably one of the best proven ways of preventing these kinds of threats. The main challenge in security ...
ver más
|
|
|
|
|
|
|
Bahareh Lashkari and Petr Musilek
With the widespread adoption of blockchain platforms across various decentralized applications, the smart contract?s vulnerabilities are continuously growing and evolving. Consequently, a failure to optimize conventional vulnerability analysis methods re...
ver más
|
|
|
|
|
|
|
Zainab Jamroz, Insaf Ullah, Bilal Hassan, Noor Ul Amin, Muhammad Asghar Khan, Pascal Lorenz and Nisreen Innab
The Internet of Medical Things (IoMT) overcomes the flaws in the traditional healthcare system by enabling remote administration, more effective use of resources, and the mobility of medical devices to fulfil the patient?s needs. The IoMT makes it simple...
ver más
|
|
|
|
|
|
|
Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, Inayatul Haq, Inam Ullah, Muhammad Iqbal and Habib Hamam
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the most challenging things to stop. The biggest problem is caused by milli...
ver más
|
|
|
|
|
|
|
Zeeshan Ashraf, Zahid Mahmood and Muddesar Iqbal
The advancement and innovations in wireless communication technologies including the Internet of Things have massively changed the paradigms of health-based services. In particular, during the COVID-19 pandemic, the trends of working from home have been ...
ver más
|
|
|
|
|
|
|
Tao Feng, Dewei Wang and Renbin Gong
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine...
ver más
|
|
|
|
|
|
|
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu
Software developers represent the bastion of application security against the overwhelming cyber-attacks which target all organizations and affect their resilience. As security weaknesses which may be introduced during the process of code writing are com...
ver más
|
|
|
|
|
|
|
Yunusa Simpa Abdulsalam and Mustapha Hedabou
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of t...
ver más
|
|
|
|