Optimizing Multi-Factor Authentication Protocols to Bolster Corporate User Security
See
Proposing an Information Security Framework for Small Scale BPO Sector which Provides Call Center Solution for Telecommunication Sector in Sri Lanka
See
Developing an Optimal Strategy to Address the Vulnerability of Image Tampering
See
Evaluating Zero Trust Vulnerabilities in Identity and Access Management: Strengthening Security Posture in Dynamic Environments.
See
Cyber Security Awareness and Behavior Change for IoT Users
See
Early Detection of DDoS attacks and Enhancing Feature Selection using Network Traffic Analysis with Machine Learning Techniques
See
Enhancing Email Security: Abnormal Login Detection Through Machine Learning Algorithm
See
Automated Phishing Detection: A Noval Machine Learning Approach
See