4   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Abdul Razaque, Bandar Alotaibi, Munif Alotaibi, Shujaat Hussain, Aziz Alotaibi and Vladimir Jotsov    
People who use social networks often fall prey to clickbait, which is commonly exploited by scammers. The scammer attempts to create a striking headline that attracts the majority of users to click an attached link. Users who follow the link can be redir... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nguyen Manh Thang     Pág. 24 - 28
Illegal links appear more often through social networks with "dizzying" speed. When users click on a "malicious" link it can bring them potential danger. One of the most popular social networks is Facebook. It is one of the ways for hackers to share mali... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Nandoori Srikanth,Muktyala Siva Ganga Prasad    
Random deployment of sensor nodes, energy limitations, interference of wireless links, and exposed nodes, are the major reasons of performance degradation in WSN. Energy efficiency, Lifetime improvements are the key research areas from last few decades. ... ver más

 
en línea
Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz and Mamoun Alazab    
In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »