Search
Now showing items 1-10 of 48
EGovernment interoperability issues in Lithuania
(proceeding of the Eight International Conference on Electronic Business, 2008)
A survey for success factors of Web application development reveals that development methodologies, tools, and techniques are not considered as important by developers for the success of Web application development. Rapid ...
Detecting Fake Followers in Twitter: A Machine Learning Approach
(IJMLC, 2017-12)
Twitter popularity has fostered the emergence of a new spam marketplace. The services that this market provides include: the sale of fraudulent accounts, affiliate programs that facilitate distributing Twitter spam, as ...
Survey of security protocols and vulnerabilities in unmanned aerial vehicles
(IEEE, 2021-03)
With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have increased in civil and military applications including rescue operations, disaster recovery, and military operations. Despite the utility ...
Sybil attacks in intelligent vehicular ad hoc networks: A review
(Springer, Singapore, 2018-04)
Vehicular Ad-hoc Networks (VANETs) are intelligent transportation system that provides wireless communication between vehicles and different objects in the road to increase human safety. Many security techniques have been ...
DoS Attacks and Countermeasures in VANETs
(Springer, Singapore, 2018-04)
Vehicular Ad Hoc Networks (VANETs) are ideal target to many attacks due to the large number of vehicles communicating with each other continually and instantly through a wireless medium. The main goal of VANETs is to enhance ...
Securing Vehicular Ad-Hoc Networks: A DDoS Case Study
(IEEE, 2021-01)
Vehicular Ad-Hoc Network is an intelligent transportation system that provides wireless communication between vehicles and different objects in the road to increase human safety. Vehicular Ad-Hoc Networks are ideal target ...
Secure software engineering: A new teaching perspective based on the SWEBOK
(Researchgate, 2010-01)
Lack of a suitable set of controls during the development life cycle of software will lead to mistakes in the requirements, design, or code of software and, therefore, result in significant security
vulnerabilities. This ...
Secure software engineering: A new teaching perspective based on the SWEBOK
(ResearchGate, 2010-01)
Lack of a suitable set of controls during the development life cycle of software will lead to mis-takes in the requirements, design, or code of software and, therefore, result in significant security vulnerabilities. This ...
Smart Visa System with Improved Security Features
(Springer, Cham, 2020)
With the growing number of fake and fraudulent companies that issue visas to UAE, people abroad seek a reliable system application to apply for UAE visa. Wasting money on non-creditable resources pushed people to complain ...
IoT Testbed Security: Smart Socket and Smart Thermostat
(IEEE, 2019-11)
Internet of Things (IoT) technology is changing the shape of our lives, however they are raising many security issues. Attackers can exploit the security vulnerabilities of IoT devices for malicious ends. Assessing the ...