Mobile health application security assesment based on owasp top 10 mobile vulnerabilities

DF Priambodo, GS Ajie, HA Rahman… - 2022 international …, 2022 - ieeexplore.ieee.org
The increase of smartphone users in Indonesia is the reason for various sectors to improve
their services through mobile applications, including the healthcare sector. The healthcare …

A vulnerability risk assessment method based on heterogeneous information network

W Wang, F Shi, M Zhang, C Xu, J Zheng - IEEE Access, 2020 - ieeexplore.ieee.org
Due to the increasing number of network security vulnerabilities, vulnerability risk
assessment must be performed to prioritize the repair of high-risk vulnerabilities. Traditional …

Hardening SAML by integrating SSO and multi-factor authentication (MFA) in the cloud

NM Karie, VR Kebande, RA Ikuesan… - Proceedings of the 3rd …, 2020 - dl.acm.org
Even though the cloud paradigm and its associated services has been adopted in various
enterprise applications, there has been major issues with regard to authenticating users' …

Cuckoo's malware threat scoring and classification: Friend or foe?

A Walker, MF Amjad, S Sengupta - 2019 IEEE 9th Annual …, 2019 - ieeexplore.ieee.org
Malware threat classification involves understanding the behavior of the malicious software
and how it affects a victim host system. Classifying threats allows for measured response …

CVSS-based vulnerability and risk assessment for high performance computing networks

JK Debnath, D **e - 2022 IEEE International Systems …, 2022 - ieeexplore.ieee.org
Common Vulnerability Scoring System (CVSS) is intended to capture the key characteristics
of a vulnerability and correspondingly produce a numerical score to indicate the severity …

Cyber security threat awareness framework for high school students in Qatar

M Al-Tajer, RA Ikuesan - arxiv preprint arxiv:2207.00820, 2022 - arxiv.org
Cyber security is considered a necessity for anyone in todays modern world. Awareness of
cyber security standards and best practices have become mandatory to safeguard ones …

Research on network risk evaluation method based on a differential manifold

X Zhao, Y Zhang, J Xue, C Shan, Z Liu - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid development of networks, network security is a serious problem. To evaluate
a network accurately, this paper proposes a network risk evaluation method based on a …

Forensic profiling of cyber-security adversaries based on incident similarity measures interaction index

VR Kebande, NM Karie, RD Wario… - … on Intelligent and …, 2018 - ieeexplore.ieee.org
In today's complex cyber space, forecasting the likelihood or probability that a Cyber
Security Adversary (CSA) is likely to attack a given infrastructure, system or a networked …

Conceptual model for crowd-sourcing digital forensic evidence

SO Baror, HS Venter, VR Kebande - The Proceedings of the International …, 2021 - Springer
COVID-19 scourge has made it challenging to combat digital crimes due to the complexity of
attributing potential security incidents to perpetrators. Existing literature does not accurately …