To search, Click below search items.
All Published Papers Search Service
Title
A Systematic Review of Security Vulnerabilities in Smart Home Devices and Mitigation Techniques
Author
Mohammed K. Alzaylaee
Vol. 25 No. 3 pp. 206-214
Keywords
Smart home security; IoT vulnerabilities; AI-driven anomaly detection; post-quantum encryption; blockchain authentication;
Design of Face Recognition System based on Convolutional Neural Network (CNN)
Yahia Said, Mohammad Barr, and Hossam Eddine Ahmed
Vol. 25 No. 3 pp. 199-205
Face Recognition, Biometrics, Convolutional Neural Networks, Artificial Intelligence, Deep Learning.
Analyzing the Behaviour of DDoS Cyber Attack
Tanvir Fatima Nail Bukht
Vol. 25 No. 3 pp. 188-198
Cybersecurity, cybercriminals, network activity, behavior of cyber-attacks, DDoS attack.
An Approach to Evaluate Software Usability of E-Communication Application
Hind Al-mayyan, Soha Al-Refai
Vol. 25 No. 3 pp. 183-187
Evaluate software usability, ¤¨-communication application. communicational environment.