[PDF][PDF] Theory and practice in secure software development lifecycle: A comprehensive survey

M Otieno, D Odera, JE Ounza - World Journal of Advanced …, 2023 - researchgate.net
Software development security refers to the practice of integrating security measures and
considerations throughout the software development lifecycle to ensure the confidentiality …

Two-factor privacy-preserving protocol for efficient authentication in Internet of Vehicles networks

MA Al Sibahee, VO Nyangaresi… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Internet of Vehicles (IoV) has greatly improved safety and quality of services in intelligent
transportation system (ITS). However, the deployed dedicated short-range communication …

[PDF][PDF] Security challenges in cloud computing: A comprehensive analysis

JJ Ang'udi - World Journal of Advanced Engineering …, 2023 - pdfs.semanticscholar.org
The security issues surrounding cloud computing, a quickly develo** technology that is
now essential to both personal and business computing, are thoroughly examined in this …

[PDF][PDF] An extensive survey of smart agriculture technologies: Current security posture

M Otieno - World J. Adv. Res. Rev, 2023 - researchgate.net
Smart agriculture, enabled by advanced technologies such as internet of things, artificial
intelligence and data analytics, offers immense potential for optimizing farming practices and …

[HTML][HTML] A symmetric key and elliptic curve cryptography-based protocol for message encryption in unmanned aerial vehicles

VO Nyangaresi, HM Jasim, KAA Mutlaq… - Electronics, 2023 - mdpi.com
Unmanned aerial vehicles have found applications in fields such as environmental
monitoring and the military. Although the collected data in some of these application …

Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme

VO Nyangaresi, ZA Abduljabbar, KAA Mutlaq… - Scientific Reports, 2024 - nature.com
Advancements in cloud computing, flying ad-hoc networks, wireless sensor networks,
artificial intelligence, big data, 5th generation mobile network and internet of things have led …

Safeguarding the future: A comprehensive analysis of security measures for smart grids

SA Wasumwa - World Journal of Advanced Research and Reviews, 2023 - wjarr.co.in
With the rapid advancement of technology and the growing reliance on renewable energy
sources, smart grids have emerged as a transformative solution for enhancing the efficiency …

[PDF][PDF] Ensuring resilience: Integrating IT disaster recovery planning and business continuity for sustainable information technology operations

DM Kesa - World Journal of Advanced Research and Reviews, 2023 - academia.edu
Abstract Information Technology (IT) Disaster Recovery Planning (IT DRP) and Business
Continuity (BC) are essential components of an organization's overall resilience strategy. IT …

Security challenges in civil registration: safeguarding vital information in an evolving landscape

PK Okoth - World Journal of Advanced Research and Reviews, 2023 - wjarr.co.in
Civil registration is a fundamental process that captures vital events such as births, deaths,
marriages, and divorces, enabling governments to create accurate demographic databases …

A Review on IoTs Applications and Security Threats via Data Transfer over Networks

BM Radhi, MA Hussain, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
The concept of the “Internet of Things,” which states that everything is connected to
everything else and that everything interacts with everything else, is a fascinating …