ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Architecture and Urbanism
Computing
Technology
Communication
Computing

Languages
English

Countries
Canada
USA
Indonesia

Years
2021
2018

Filter  
 
3  Articles
1 of 1 pages  |  10  records  |  more records»
Passwords are considered the most commonly used method of authentication.  Unfortunately, weak passwords are known to be the main cause of many cyber attacks.  With stronger passwords, it is believed that this first line of defence would be able... see more

This research concerns the analysis of social networks using graph theory to find properties that can be used to determine Sybil nodes. This research also investigated the mixing time, which is one of the properties that many existing methods use for dete... see more

1 of 1 pages  |  10  records  |  more records»