Over the past decade, there has been an increase in cybersecurity breaches through identity theft, hacking, phishing attacks, and the use of malware such as vir
This article surveys the literature on social engineering. There are lots of security application and hardware in market;still there are several methods that ca
Semiconductor optical amplifier-based ring cavity laser (SOA-RL), which has been widely used in optical communications, optical fiber sensing, and biophotonics
Nowadays many devices that make up a computer network are being equipped with security hardware and software features to prevent cyber security attacks. The ide
Gunn oscillations in a GaN based planar nano-device have been studied by ensemble Monte Carlo (EMC) method. Simulation results show that when the channel length