Search
Skip to Search Results- 3Bukatov, Sergey
- 2Kaur, Amandeep
- 2Lindskog, Dale
- 1Adegoke, Babajide Seyi
- 1Adeniyi, Oluwatola
- 1Ahamed, Waheeda Syed Shameem
-
2022
This research analyzed selected contact tracing applications to identify potential vulnerabilities and geolocation of services used by these applications. MobSF framework and Android emulators were used to perform static and dynamic analysis of the applications. Security policies of applications...
-
2021-04-01
Single Packet Authorization (SPA) is the technique used to guard camouflaged network services against unauthorized users. SPA hides specific ports from the external world to reduce attacks at TLS ports until a cryptographically protected packet is received and authorized by the transport layer....
-
2021-06-01
Bains, Jayant Singh, Goyal, Rahul, Kopanati, Hemanth Varma, Savaram, Bhargav Krishna
IoT devices have become the future of many industries like household, security, etc. but these devices have a requirement that is that they should be connected to a network. This makes them vulnerable to outside attacks. If security is built into each device, it would cost more and would not...
-
2021-06-01
Kolencheril, Jerbin Joy, Messerschmidt, Mitchell, Bhusri, Sagar, Kotha, Vamshidhar Reddy, Jawanda, Gurcharan, Thomas, Betsy Elsa, Bonagiri, Raja Venkata Sandeep Kumar, Shah, Aakash, Nallarala, Abhilash, Garg, Gaurav, Pathak, Isha, Saggu, Ravdeep, Doddaka, Sravya, Pole, Sparsha, Singh, Satinderpal, Vadlamudi, Tejaswini, Sethuraman, Vigneshwar, Vangala, Vishista, Kaur, Amritpal, Kaur, Parminder, Chittimalla, Sai Kumar, Chittimalla, Sandeep, Patel, Priyesha, Kirandeep, Singh, Mandeep, Joshi, Dhanvi, Pathan, Rahim Khan, Ancha, Jyothi Sharmila, Kaur, Amandeep, Bagla, Navjot, Thakur, Preeti, Pugalenthi, Subaveena, Garrapu, Tharun, Gummakonda, Anirudh, Soobhri, Pawan, Kaur, Simranbir, Ahuja, Puneet, Rathod, Divya, Varma, Upasana, Nadipineni, Pavan kumar, Vemuri, Keerthi Kishore, Maadeereddy, Amulya, Raikar, Akshata Rajendra, Sunkara, Leela Suresh, Mehta, Akshat, Heena, Kaur, Kiranjit, Shah, Anish Manishkumar, Elumalai, Sweatha, Joshi, Mansi, Chauhan, Bhavyarajsinh, Nellore, Rishab Kumar Singh, Lindskog, Dale
In recent years, the prevalent utilization of technology and web applications has given rise to security vulnerabilities. This problem has dramatically increased the demand for proposed security models and mechanisms. Organizations find it challenging to secure their web applications and find...
-
2021-04-01
Oha, Chibueze Victor, Farouk, Fathima Shakoora, Patel, Pujan Pankaj, Meka, Prithvi, Nekkanti, Sowmya, Nayini, Bhageerath, Carvalho, Smit Xavier, Desai, Nisarg, Patel, Manishkumar
Connected devices are penetrating the market with an unprecedented speed. Networks that carry Internet of Things (IoT) traffic need highly adaptable tools for traffic analysis in order to detect and suppress malicious agents. This has prompted researchers to explore the various benefits machine...
-
2021-04-01
Brar, Kanwarpreet Singh, Bhola, Hitesh
This research outlines a template of audit and assurance program for NoSQL DBMSs based on the COBIT framework. With the increase in the use of NoSQL technologies in enterprises, there are various technical and managerial risks associated with them. Some of the major technical risks include lack...
-
2021-04-01
Adeniyi, Oluwatola, Chauhan, Digvijay, Ezidonye, Ugochukwu, Ayeni, Mojisola, Patel, Vishwa
The evolution of communication technologies led to active virtualization of computer network solutions and proliferation of the Software Defined Networks (SDN) as a centralized network infrastructure management tool. The SDN is a relatively new technology and rush to move products to the market...
-
Securing remote access networks using malware detection tools for industrial control systems
Download2020
With their role as an integral part of its infrastructure, Industrial control systems (ICS) are a vital part of every nation’s industrial development drive. Like every other facet of life, ICS have witnessed the integration of information systems (IS) into their processes, connecting them to the...
-
2020
In recent times, ensuring data and user privacy has been one of the biggest impediments in information technology. With the advent of high penalties for privacy breaches and the high risk of reputation loss for a corporation, the need to comply with privacy regulations have never been greater....
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
In this research project , the forensic assessment, identification, and prevention of the Metasploit 2 exploits were performed using SNORT to evolve useful rules for future reference to ensure high level information security.