期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps
1
作者 Muhammad Bilal Sandile C.Showngwe +1 位作者 Abid Bashir Yazeed Y.Ghadi 《Computers, Materials & Continua》 SCIE EI 2023年第6期4713-4733,共21页
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task nowadays.For this purpose,authen-tication protocol plays a vital role in web communication which securely transfers dat... To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task nowadays.For this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from one party to another.This authentication works via OpenID,Kerberos,password authentication protocols,etc.However,there are still some limitations present in the reported security protocols.In this paper,the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern method.The proposed OpenID-based encrypted Email’s Authentication,Authorization,and Accounting(EAAA)protocol ensure security by relying on the email authenticity and a Special Secret Encrypted Alphanumeric String(SSEAS).This string is deployed on both the relying party and the email server,which is unique and trustworthy.The first authentication,OpenID Uniform Resource Locator(URL)identity,is performed on the identity provider side.A second authentication is carried out by the hidden Email’s server side and receives a third authentication link.This Email’s third SSEAS authentication link manages on the relying party(RP).Compared to existing cryptographic single sign-on protocols,the EAAA protocol ensures that an OpenID URL’s identity is secured from MITM and phishing attacks.This study manages two attacks such as MITM and phishing attacks and gives 339 ms response time which is higher than the already reported methods,such as Single Sign-On(SSO)and OpenID.The experimental sites were examined by 72 information technology(IT)specialists,who found that 88.89%of respondents successfully validated the user authorization provided to them via Email.The proposed EAAA protocol minimizes the higher-level risk of MITM and phishing attacks in an OpenID-based atmosphere. 展开更多
关键词 SECURE user authentication SSO OPENID phishing attack MITM attack
下载PDF
An Ingenious IoT Based Crop Prediction System Using ML and EL
2
作者 Shabana Ramzan Yazeed Yasin Ghadi +2 位作者 Hanan Aljuaid Aqsa Mahmood Basharat Ali 《Computers, Materials & Continua》 SCIE EI 2024年第4期183-199,共17页
Traditional farming procedures are time-consuming and expensive as based on manual labor. Farmers haveno proper knowledge to select which crop is suitable to grow according to the environmental factors and soilcharact... Traditional farming procedures are time-consuming and expensive as based on manual labor. Farmers haveno proper knowledge to select which crop is suitable to grow according to the environmental factors and soilcharacteristics. This is the main reason for the low yield of crops and the economic crisis in the agricultural sectorof the different countries. The use of modern technologies such as the Internet of Things (IoT), machine learning,and ensemble learning can facilitate farmers to observe different factors such as soil electrical conductivity (EC),and environmental factors like temperature to improve crop yield. These parameters play a vital role in suggestinga suitable crop to cope the food scarcity. This paper proposes a systemcomprised of twomodules, first module usesstatic data and the second module takes hybrid data collection (IoT-based real-time data and manual data) withmachine learning and ensemble learning algorithms to suggest the suitable crop in the farm to maximize the yield.Python is used to train the model that predicts the crop. This system proposed an intelligent and low-cost solutionfor the farmers to process the data and predict the suitable crop.We implemented the proposed system in the field.The efficiency and accuracy of the proposed system are confirmed by the generated results to predict the crop. 展开更多
关键词 Machine learning Internet of Things sensors ensemble learning
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部