5 Questions 8 Answers 0 Followers
Questions related from Rana Abubakar
I felt frustrated when an attacker discovered vulnerabilities using open source scanners that were not found by state-of-the-art professional scanners.
04 July 2022 3,235 0 View
I am review security requirements frameworks for UAV security. I want to cover UAV security with CIA principles with authentication and non-repudation. Can I add these into the CIA triad?
11 September 2021 3,550 7 View
I want to publish a paper at the EI-Compendex conference, please suggest a conference with a high acceptance rate. My field of research is IoT security and cryptography analysis.
20 October 2020 5,665 3 View
I am currently working on IoT authentication systematic literature review. Please suggest the IoT authentication protocol based on behavioural.
27 May 2020 1,441 5 View
I am confused to get correct accuracy equation, Most of the paper used this equation Accuracy = (T N + TP)/(TP + FP + F N + T N)× 100 some of papers found with this equation Accuracy = (T P...
22 April 2020 2,420 0 View