To search, Click below search items.
All Published Papers Search Service
Title
Sabotage of Intruder Alarm System Loop
Author
Karel Burda
Vol. 23 No. 7 pp. 23-31
Keywords
Security, intruder alarm system, balanced loop, loop sabotage.
Performance Analysis of Blockchain Consensus Protocols- A Review
Amina Yaqoob, Alma Shamas, Jawad Ibrahim
Vol. 23 No. 6 pp. 181-192
Blockchain, Consensus Protocols, Security, Performance Measures
The Importance of Ethical Hacking Tools and Techniques in Software Development Life Cycle
Syed Zain ul Hassan, Saleem Zubair Ahmad
Vol. 23 No. 6 pp. 169-175
Ethical Hacking, Software Security, Software Quality Assurance, Software Testing, Ethical Hacking SDLC, Secure SDLC, Penetration testing.
A Survey of Cybersecurity Vulnerabilities in Healthcare Systems
Adwan Alownie Alanazi
Vol. 23 No. 6 pp. 155-161
healthcare; cyber security; attack; malware; patient; threat; Access data; attacker; vulnerability; malicious program; approach; authentication; challenges; intruder; encryption