Review of Internet of Things (IoT) in electric power and energy systems
A transformation is underway in electric power and energy systems (EPESs) to provide
clean distributed energy for sustainable global economic growth. Internet of Things (IoT) is at …
clean distributed energy for sustainable global economic growth. Internet of Things (IoT) is at …
Computer security
D Gollmann - Wiley Interdisciplinary Reviews: Computational …, 2010 - Wiley Online Library
Computer security encompasses concepts and methods for protecting sensitive resources in
computer systems. Computer security starts from the policies that regulate access to …
computer systems. Computer security starts from the policies that regulate access to …
A survey of phishing email filtering techniques
Phishing email is one of the major problems of today's Internet, resulting in financial losses
for organizations and annoying individual users. Numerous approaches have been …
for organizations and annoying individual users. Numerous approaches have been …
Phishing counter measures and their effectiveness–literature review
S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …
and technique advancements are posing big challenges for researchers in both academia …
Machine Learning for Computer and Cyber Security
BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
A systematic review on security of E-commerce systems
With the emergence of digitalization, making the use of Internet almost for everything is not a
new trend. The maximum use of it is in the E-commerce systems. Most of the customers are …
new trend. The maximum use of it is in the E-commerce systems. Most of the customers are …
Group authentication
L Harn - IEEE Transactions on computers, 2012 - ieeexplore.ieee.org
A new type of authentication, call group authentication, which authenticates all users
belonging to the same group is proposed in this paper. The group authentication is specially …
belonging to the same group is proposed in this paper. The group authentication is specially …
Performance issues with vertical handovers-experiences from GPRS cellular and WLAN hot-spots integration
Interworking heterogeneous wireless access technologies is an important step towards
building the next generation, all-IP wireless access infrastructure. We present an …
building the next generation, all-IP wireless access infrastructure. We present an …
TLS proxies: Friend or foe?
We measure the prevalence and uses of TLS proxies using a Flash tool deployed with a
Google AdWords campaign. We generate 2.9 million certificate tests and find that 1 in 250 …
Google AdWords campaign. We generate 2.9 million certificate tests and find that 1 in 250 …
Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties
The security guarantees provided by SSL/TLS depend on the correct authentication of
servers through certificates signed by a trusted authority. However, as recent incidents have …
servers through certificates signed by a trusted authority. However, as recent incidents have …