With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...