IT risks—risks associated with the operation or use of information technology—have taken on great importance in business, and IT risk management is accordingl
This research attempts the implementation of an improved smartphone application for remote system administration. The work was motivated by the inability of net
In this paper, two Evolutionary Algorithms (EAs) i.e., an improved Genetic Algorithms (GAs) and Population Based Incremental Learning (PBIL) algorithm are appli
Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ah
This article explores four critical groups of systematic risk embedded in smart contract employment using the analytic hierarchy process (AHP). The four princip
With the systematization of cyber threats, the variety of intrusion tools and intrusion methods has greatly reduced the cost of attackers’ threats to network s