IT assets, IT infrastructure performance and IT capability: a framework for e-government

D Dahiya, SK Mathew - Transforming Government: People, Process …, 2016 - emerald.com
Purpose Although government investments in IT is growing, it is unclear how and what kind
of IT investments lead to desirable E-Government performance. Several studies pertaining to …

[PDF][PDF] An investigation on detection of vulnerabilities in Internet of Things

A Raghuvanshi, UK Singh, C Bulla… - European Journal of …, 2020 - academia.edu
IoT is a woven mixture of traditional systems, sensors, clouds, mobile applications, Web
applications and control systems, affecting every aspect of people's lives. Security concerns …

An algorithm for computing Voronoi diagrams of general generators in general normed spaces

D Reem - 2009 Sixth International Symposium on Voronoi …, 2009 - ieeexplore.ieee.org
Voronoi diagrams appear in many areas in science and technology and have diverse
applications. Roughly speaking, they are a certain decomposition of a given space into cells …

A survey and classification of XML based attacks on web applications

C Gupta, RK Singh, AK Mohapatra - Information Security Journal …, 2020 - Taylor & Francis
ABSTRACT XML based attacks are executed in web applications through crafted XML
document that forces XML parser to process un-validated documents. This leads to …

Web services security and threats: A systematic literature review

EA Setyawan, F Hidayat - … Conference on ICT for Smart Society …, 2020 - ieeexplore.ieee.org
Privacy and data protection issues are the main problems in using web services to transmit
data. Three aspects of information security that contains confidentiality, integrity, and …

Environmental sound classification based on time-frequency representation

KZ Thwe, N War - … 18th IEEE/ACIS International Conference on …, 2017 - ieeexplore.ieee.org
This paper proposes a feature extraction method for environmental sound event
classification based on time-frequency representation such as spectrogram. There are three …

Making xml signatures immune to xml signature wrap** attacks

C Mainka, M Jensen, L Lo Iacono… - Cloud Computing and …, 2013 - Springer
The increased usage of XML in distributed systems and platforms increases the demand for
robust and effective security mechanisms likewise. Recent research work discovered …

Vulnerability of cloud: Analysis of XML signature wrap** attack and countermeasures

S Modak, K Majumder, D De - … of International Conference on Frontiers in …, 2021 - Springer
Abstract Simple Object Access Protocol (SOAP) uses text-supported eXtensible Markup
Language (XML) messaging configuration to interchange web encrypted information over a …

[PDF][PDF] XSpRES-Robust and Effective XML Signatures for Web Services.

C Mainka, M Jensen, LL Iacono, J Schwenk - CLOSER, 2012 - nds.ruhr-uni-bochum.de
XML Encryption and XML Signature are fundamental security standards forming the core for
many applications which require to process XML-based data. Due to the increased usage of …

Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment

R Bhardwaj, S Gogula, B Bhabani… - Natural Language …, 2025 - Wiley Online Library
Summary The Internet of Things (IoT) refers to the increasing connectivity of many human‐
made entities, such as healthcare systems, smart homes, and smart grids, through the …