Review of Internet of Things (IoT) in electric power and energy systems

G Bedi, GK Venayagamoorthy, R Singh… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
A transformation is underway in electric power and energy systems (EPESs) to provide
clean distributed energy for sustainable global economic growth. Internet of Things (IoT) is at …

Computer security

D Gollmann - Wiley Interdisciplinary Reviews: Computational …, 2010 - Wiley Online Library
Computer security encompasses concepts and methods for protecting sensitive resources in
computer systems. Computer security starts from the policies that regulate access to …

A survey of phishing email filtering techniques

A Almomani, BB Gupta, S Atawneh… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Phishing email is one of the major problems of today's Internet, resulting in financial losses
for organizations and annoying individual users. Numerous approaches have been …

Phishing counter measures and their effectiveness–literature review

S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …

Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

A systematic review on security of E-commerce systems

S Badotra, A Sundas - International Journal of Applied Science and …, 2021 - gigvvy.com
With the emergence of digitalization, making the use of Internet almost for everything is not a
new trend. The maximum use of it is in the E-commerce systems. Most of the customers are …

Group authentication

L Harn - IEEE Transactions on computers, 2012 - ieeexplore.ieee.org
A new type of authentication, call group authentication, which authenticates all users
belonging to the same group is proposed in this paper. The group authentication is specially …

Performance issues with vertical handovers-experiences from GPRS cellular and WLAN hot-spots integration

R Chakravorty, P Vidales… - Second IEEE Annual …, 2004 - ieeexplore.ieee.org
Interworking heterogeneous wireless access technologies is an important step towards
building the next generation, all-IP wireless access infrastructure. We present an …

TLS proxies: Friend or foe?

M O'Neill, S Ruoti, K Seamons, D Zappala - Proceedings of the 2016 …, 2016 - dl.acm.org
We measure the prevalence and uses of TLS proxies using a Flash tool deployed with a
Google AdWords campaign. We generate 2.9 million certificate tests and find that 1 in 250 …

Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties

I Dacosta, M Ahamad, P Traynor - … on Research in Computer Security, Pisa …, 2012 - Springer
The security guarantees provided by SSL/TLS depend on the correct authentication of
servers through certificates signed by a trusted authority. However, as recent incidents have …