[PDF][PDF] Theory and practice in secure software development lifecycle: A comprehensive survey

M Otieno, D Odera, JE Ounza - World Journal of Advanced …, 2023 - researchgate.net
Software development security refers to the practice of integrating security measures and
considerations throughout the software development lifecycle to ensure the confidentiality …

A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client

SS Bulbul, ZA Abduljabbar, RJ Mohammed… - Plos one, 2024 - journals.plos.org
Outsourcing data to remote cloud providers is becoming increasingly popular amongst
organizations and individuals. A semi-trusted server uses Searchable Symmetric Encryption …

[PDF][PDF] An extensive survey of smart agriculture technologies: Current security posture

M Otieno - World J. Adv. Res. Rev, 2023 - researchgate.net
Smart agriculture, enabled by advanced technologies such as internet of things, artificial
intelligence and data analytics, offers immense potential for optimizing farming practices and …

Safeguarding the future: A comprehensive analysis of security measures for smart grids

SA Wasumwa - World Journal of Advanced Research and Reviews, 2023 - wjarr.co.in
With the rapid advancement of technology and the growing reliance on renewable energy
sources, smart grids have emerged as a transformative solution for enhancing the efficiency …

A comprehensive overview of privacy, security and performance issues in flying Ad Hoc Networks

E Asituha - World Journal of Advanced Research and Reviews, 2024 - wjarr.co.in
Flying Ad Hoc Networks (FANETs) represent an ever evolving area in wireless network
communications, despite this massive achievements, FANETs faces significant security …

[PDF][PDF] Ensuring resilience: Integrating IT disaster recovery planning and business continuity for sustainable information technology operations

DM Kesa - World Journal of Advanced Research and Reviews, 2023 - academia.edu
Abstract Information Technology (IT) Disaster Recovery Planning (IT DRP) and Business
Continuity (BC) are essential components of an organization's overall resilience strategy. IT …

[PDF][PDF] Secure Content Based Image Retrieval System Using Deep Learning

MA Mohammed, MA Hussain, ZA Oraibi… - Basrah Researches …, 2023 - iasj.net
This paper investigates Content-Based Image Retrieval (CBIR) using an ensemble of three
cutting-edge deep learning architectures: Xception, MobileNet, and Inception. This …

Security challenges in civil registration: safeguarding vital information in an evolving landscape

PK Okoth - World Journal of Advanced Research and Reviews, 2023 - wjarr.co.in
Civil registration is a fundamental process that captures vital events such as births, deaths,
marriages, and divorces, enabling governments to create accurate demographic databases …

[PDF][PDF] Tackling security and privacy challenges in the realm of big data analytics

J Ngesa - World Journal of Advanced Research and Reviews, 2024 - researchgate.net
As organizations increasingly harness the power of big data analytics to derive insights and
drive decision-making, the paramount concerns of security and privacy have come to the …

Secure and Fast Remote Application–Based Authentication Dragonfly Using an LED Algorithm in Smart Buildings

BM Radhi, MA Hussain, ZA Abduljabbar… - … in Information and …, 2024 - ieeexplore.ieee.org
The proliferation of the internet of things (IoT) has led to the emergence of a wide range of
intelligent devices, creating a broad domain with significant security concerns. These …