[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 16, Issue 62024
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1751-911X
EISSN:1751-9128
Reflects downloads up to 03 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
A novel IoT-enabled portable, secure automatic self-lecture attendance system: design, development and comparison

This study focuses on the importance of monitoring student attendance in education and the challenges faced by educators in doing so. Existing methods for attendance tracking have drawbacks, including high costs, long processing times, and inaccuracies, ...

research-article
Honeybrid method for network security in a software defined network system

This research introduces a hybrid honeypot architecture to bolster security within software-defined networks (SDNs). By combining low-interaction and high-interaction honeypots, the proposed solution effectively identifies and mitigates cyber threats, ...

research-article
Electronic disciplinary violations and methods of proof in Jordanian and Egyptian laws

The use of electronic means of a public official in carrying out their duties may lead to an instance wherein the person discloses confidential information, which can significantly impact their obligations. After verifying this act as part of electronic ...

research-article
The authenticity of digital evidence in criminal courts: a comparative study

Scientific progress has a significant impact on both reality and the law that applies to it. As the ICT system has positive points that are considered an added value to it, it made it easier for people to perform their tasks and facilitate interpersonal ...

research-article
Implementation of a novel technique for ordering of features algorithm in detection of ransomware attack

In today's world, malware has become a part and threat to our computer systems. All electronic devices are very susceptible/vulnerable to various threats like different types of malware. There is one subset of malware called ransomware, which is majorly ...

research-article
Android malware analysis using multiple machine learning algorithms

Currently, Android is a booming technology that has occupied the major parts of the market share. However, as Android is an open-source operating system there are possibilities of attacks on the users, there are various types of attacks but one of the ...

research-article
A forensic approach: identification of source printer through deep learning

Forensic document forgery investigations have elevated the need for source identification for printed documents during the past few years. It is necessary to create a reliable and acceptable safety testing instrument to determine the credibility of ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.