Cargando…
A comprehensive review of security threats and solutions for the online social networks industry
The term “cyber threats” refers to the new category of hazards that have emerged with the rapid development and widespread use of computing technologies, as well as our growing reliance on them. This article presents an in-depth study of a variety of security and privacy threats directed at differen...
Autores principales: | Nawaz, Naeem A., Ishaq, Kashif, Farooq, Uzma, Khalil, Amna, Rasheed, Saim, Abid, Adnan, Rosdi, Fadhilah |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280274/ https://www.ncbi.nlm.nih.gov/pubmed/37346522 http://dx.doi.org/10.7717/peerj-cs.1143 |
Ejemplares similares
-
A new secure authentication based distance bounding protocol
por: Sultan, Ahmed Raheeq, et al.
Publicado: (2021) -
A secure key dependent dynamic substitution method for symmetric cryptosystems
por: Ejaz, Aisha, et al.
Publicado: (2021) -
Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective
por: Kapil, Gayatri, et al.
Publicado: (2020) -
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
por: Seyhan, Kübra, et al.
Publicado: (2023) -
Hybrid post-quantum Transport Layer Security formal analysis in Maude-NPA and its parallel version
por: Tran, Duong Dinh, et al.
Publicado: (2023)