Abstract: Due to the growth of Internet of Things (IoT) devices on networks with limited resources, developing a safe and effective authentication method for Device-to-Device (D2D) communication has ...
Mandiant says a wave of recent ShinyHunters SaaS data-theft attacks is being fueled by targeted voice phishing (vishing) attacks and company-branded phishing sites that steal single sign-on (SSO) ...
Abstract: The growing adoption of Vehicle-to-Everything (V2X) communications in Intelligent Transportation Systems (ITS) demands robust authentication protocols to ensure secure and reliable ...
ABSTRACT: In prior work we described techniques used to capture, store, and retrieve narrative data forms from a database using widely available off the shelf software. This concept makes use of the ...