A novel IoT-enabled portable, secure automatic self-lecture attendance system: design, development and comparison
- Ata Jahangir Moshayedi,
- Atanu Shuvam Roy,
- Hamidreza Ghorbani,
- Habibollah Lotfi,
- Xiaohong Zhang,
- Leifa Liao,
- Mehdi Gheisari
This study focuses on the importance of monitoring student attendance in education and the challenges faced by educators in doing so. Existing methods for attendance tracking have drawbacks, including high costs, long processing times, and inaccuracies, ...
Honeybrid method for network security in a software defined network system
This research introduces a hybrid honeypot architecture to bolster security within software-defined networks (SDNs). By combining low-interaction and high-interaction honeypots, the proposed solution effectively identifies and mitigates cyber threats, ...
Electronic disciplinary violations and methods of proof in Jordanian and Egyptian laws
The use of electronic means of a public official in carrying out their duties may lead to an instance wherein the person discloses confidential information, which can significantly impact their obligations. After verifying this act as part of electronic ...
The authenticity of digital evidence in criminal courts: a comparative study
Scientific progress has a significant impact on both reality and the law that applies to it. As the ICT system has positive points that are considered an added value to it, it made it easier for people to perform their tasks and facilitate interpersonal ...
Implementation of a novel technique for ordering of features algorithm in detection of ransomware attack
In today's world, malware has become a part and threat to our computer systems. All electronic devices are very susceptible/vulnerable to various threats like different types of malware. There is one subset of malware called ransomware, which is majorly ...
Android malware analysis using multiple machine learning algorithms
Currently, Android is a booming technology that has occupied the major parts of the market share. However, as Android is an open-source operating system there are possibilities of attacks on the users, there are various types of attacks but one of the ...
A forensic approach: identification of source printer through deep learning
Forensic document forgery investigations have elevated the need for source identification for printed documents during the past few years. It is necessary to create a reliable and acceptable safety testing instrument to determine the credibility of ...