Tag: security

Diving into Linux Malware: A Review

Since any decades ago, malicious programs for Windows-located operating systems have happened a problem for the security manufacturing around the experience. The proliferation of embedded electronics and the Internet of Things, however, has extended dramatically along with concerning details advancement, that has caused a rapid shift in the malware surroundings. Embedded devices work on a […]

Electronic Security System for Agricultural Field

Agricultural field security is critical today. Threats to agricultural fields can come from a variety of sources. Producers must be mindful of the danger of crop loss or contamination that is done on purpose. Safe medications can be used to make dangerous or harmful mixes if they are used inappropriately or indiscriminately. Chemicals and bodily […]

Threats and Protection on E-sim: A Prospective Study

Threats encompass a wide range of dangers, and some of these concerns are related with integrated SIM technology, such as Internet of things (IoT) identification. The Internet of Things (IoT) refers to the working capabilities that enable the allocation of unique identifiers (UID) in order to successfully interact with the linked devices, hence increasing communication. […]

Usability Analysis of Biometric Authentication Scheme for Smart Mobile Devices | Chapter 12 | Innovations in Science and Technology Vol. 6

 The use of mobile devices to access data has increased in recent years, as has the use of mobile devices in applications such as web browsing, email, multimedia, entertainment applications, navigation, stock trading, electronic purchase, banking, and health care. As a result, data security has become more important, and securing data in mobile devices has […]

Theory of Securitization to Counter Ebola Virus: The Nigerian Approach

The Ebola Virus Disease (EVD) epidemic in 2014 was one of the zoonotic diseases[1] that posed a health security danger to the international community. Guinea, Liberia, Sierra Leone, Nigeria, Senegal, and Mali in West Africa were affected, as were the United States and Spain outside of Africa. Nigeria and Senegal, on the other hand, successfully […]

Enabling a Physical Model on Electronic Charge Compensation Device –ECCD- as a Quantum Dissipative System

An ECCD is a passive device that sends electrical currents to the electrical Earth on a regular basis. It protects the protected region from lightning strikes, derivative electric current pulses, and radio-frequency disturbances. The goal of this work is to provide a rough physical approximation of an ECCD’s operation, as well as improved benefits. The […]

Significant Study of Data Encryption and Steganography

The usage of the internet is increasing over the world these days, making security a big worry for consumers. Any information that is saved on a digital platform is referred to as data. The safeguarding of data is what security is all about. Data security refers to the use of digital safeguards to secure data […]

SVD based Audio Watermarking Algorithm Using Dual Watermark for Copyright Protection

Because of the flexibility of Internet technology, concerns regarding the security of digital data have arisen. The art of masking crucial data in digital audio is known as digital audio watermarking. This study discusses a new methodology for improving the resilience of the Digital Audio Watermarking technique, which is based on the Discrete Wavelet Transform […]

Determination of Efficient and Secured Healthcare Monitoring Based on IoT Along with Machine Learning

A Health Monitoring System (HMS) is a cutting-edge technology that provides an alternative to standard patient and health management methods. The Internet of Things (IoT) is crucial in the healthcare sector. Various patient health parameters can be read and stored in the cloud using an IoT device for various analysis purposes. Various statistical and machine […]

A Survey on MAC Layer Security Challenges in WMNs

For its self-organizing, self-configuring, and self-healing capabilities, as well as their low cost and ease of maintenance, Wireless Mesh Networks (WMNs) have emerged as a potential technology for a wide range of applications. Due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology, and decentralised architecture, securing […]

Back To Top