Sunday, October 27, 2024
Home Search

intruder - search results

If you're not happy with the results, please do another search

Managing The IoT Lifecycle From Design Through End-of-Life

Developing applications and devices for the Internet of Things (IoT) poses unique challenges. Because IoT systems may be expected to perform for many years,...

Monitoring and Tracking Hackers’ Activities Using Honeynets

According to the Honeynet Project and Research Alliance, a honeynet is a tool that can be used to learn about targets, and methods and...

Glass Break Alarm

This circuit can be used for sounding an alarm to detect the breaking of a glass window by an intruder, even when the intruder...

Cyber Threats And Their Various Types

With so many government, commercial, defence and private systems connected to the ubiquitous Internet, cyber threats are becoming a major concern. It is important...

Be Safe With B-Safe

B-Safe is a security system that can detect and intimate the users about any intrusion or fire in a locked/closed space. A loud alarm...

Broadband over Power Lines

Despite the proliferation of broadband Internet technology in the last few years, many regions of the world, particularly rural and low-income areas, still do...

Part 1 of 2: An Introduction to Wireless Sensor Networks

A wireless sensor network (WSN) is a communication system which senses and gathers information from a certain area and sends it to different places...

Part 1 of 2: How Secure are Your E-mails

E-mail security has been a growing concern over the past few years. The average individual, who uses e-mail, naively believes that his e-mail is...

En Route to Security 3.0

Historically, it has been a challenge to visualise fingerprints on thermal paper, Fear redefines security in every era. Huts began to have doors when...

Building Image Processing Embedded Systems Using Python

This project describes a technique to capture human faces using image processing and turn on an LED on the Arduino board. With some modification...