• Publications
  • Influence
Exploring Security Theory Approach in BYOD Environment
BYOD (Bring Your Own Device) is a business policy to allow employees to bring their own devices at their work. The employee uses the same device in and out of the corporate office and during outsideExpand
An Approach to Implement Bring Your Own Device (BYOD) Securely
TLDR
BYOD (Bring Your Own Device) is a business policy to allow employees to bring their own devices at their work. Expand
Protection against packet drop attack
TLDR
Routers in any infrastructure are most interesting part for any attacker because almost whole traffic flows through these and drastic activities can be done with routers. Expand
A performance evaluation of semantic based search engines and keyword based search engines
TLDR
Semantic based search engine are able to provide more relevant information because they understand the meaning of the term and relationship between the terms and web pages but keyword basedsearch engine not able to understand these thing. Expand
Analyzer Router: An Approach to Detect and Recover from OSPF Attacks
TLDR
We here present an approach to detect the attacks to which OSPF is vulnerable and mitigate these attacks. Expand