Search
Now showing items 1-4 of 4
Implications of Malicious 3D Printer Firmware
(Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
The utilization of 3D printing technology within the manufacturing process creates an environment that is potentially conducive to malicious activity. Previous research in 3D printing focused on attack vector identification ...
Knock! Knock! Who is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack
(Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020-01)
The amalgamation of Medical Internet of Things (MIoT) devices into everyday life is influencing the landscape of modern medicine. The implementation of these devices potentially alleviates the pressures and physical demands ...
Web Engineering Security (WES) Methodology
(Communications of the Association for Information Systems, 2014)
The impact of the World Wide Web on basic operational economical components in global information-rich
civilizations is significant. The repercussions force organizations to provide justification for security from a ...
Security, Privacy and Steganographic Analysis of FaceApp and TikTo
(International Journal of Computer Science and Security, 2020)
Smartphone applications (Apps) can be addictive for users due to their uniqueness, ease-of-use,
trendiness, and growing popularity. The addition of Artificial Intelligence (AI) into their functionality
has rapidly gained ...