Home Search
intruder - search results
If you're not happy with the results, please do another search
Managing The IoT Lifecycle From Design Through End-of-Life
Developing applications and devices for the Internet of Things (IoT) poses unique challenges. Because IoT systems may be expected to perform for many years,...
Monitoring and Tracking Hackers’ Activities Using Honeynets
According to the Honeynet Project and Research Alliance, a honeynet is a tool that can be used to learn about targets, and methods and...
Glass Break Alarm
This circuit can be used for sounding an alarm to detect the breaking of a glass window by an intruder, even when the intruder...
Cyber Threats And Their Various Types
With so many government, commercial, defence and private systems connected to the ubiquitous Internet, cyber threats are becoming a major concern. It is important...
Be Safe With B-Safe
B-Safe is a security system that can detect and intimate the users about any intrusion or fire in a locked/closed space. A loud alarm...
Broadband over Power Lines
Despite the proliferation of broadband Internet technology in the last few years, many regions of the world, particularly rural and low-income areas, still do...
Part 1 of 2: An Introduction to Wireless Sensor Networks
A wireless sensor network (WSN) is a communication system which senses and gathers information from a certain area and sends it to different places...
Part 1 of 2: How Secure are Your E-mails
E-mail security has been a growing concern over the past few years. The average individual, who uses e-mail, naively believes that his e-mail is...
En Route to Security 3.0
Historically, it has been a challenge to visualise fingerprints on thermal paper, Fear redefines security in every era. Huts began to have doors when...
Building Image Processing Embedded Systems Using Python
This project describes a technique to capture human faces using image processing and turn on an LED on the Arduino board. With some modification...