Exploring foci of
2025-07-20
Metaverse Security and Privacy Research: A Systematic Review
2025-07-20 • Argianto Rahartomo, Leonel Merino, Mohammad Ghafari
The rapid growth of metaverse technologies, including virtual worlds, augmented reality, and lifelogging, has accelerated their adoption across diverse domains. This rise exposes users to significant new security and privacy challenges due to sociotechnical complexity, pervasive connectivity, and extensive user data collection in immersive environments. We present a systematic review of the literature published between 2013 and 2024, offering a comprehensive analysis of how the research community has addressed met…
Joint Security Area
Privacy Laws Of The United States
Tokenization (Data Security)
Central Registry Of Securitisation Asset Reconstruction And Security Interest
United States Army Intelligence And Security Command
Hardware Security Module
Operations Security
Ministry Of State Security (China)
Boeing Defense, Space & Security
Exploring foci of
2025-01-21
Phishing Awareness via Game-Based Learning
2025-01-21 • Argianto Rahartomo, Ahmed Tareq Ali Ghaleb, Mohammad Ghafari
The increased use of digital devices and applications has led to a rise in phishing attacks. We develop a serious game to raise awareness about phishing attacks and help people avoid these threats in a risk-free learning environment. This game targets three types of phishing-clone phishing, SMS phishing, and spear phishing-and uses a Large Language Model to generate dialogues and questions dynamically. It also incorporates state randomization and time-limited challenges to enhance the gameplay. We evaluated two gr…
Self-Awareness
Phishing
World Autism Awareness Day
Mental Health Awareness Month
Android Team Awareness Kit
Awareness
Brand Awareness
List Of Awareness Ribbons
Situation Awareness
Exploring foci of
2018-10-01
Digital Investigation of Wireless Sensor Networks - IRIS Mote
2018-10-01 • Argianto Rahartomo, Ame Bochem, Omar Alfandi
For forensically analyzing incidents, it is important to gather as much data about the incident as possible. In the case of WSNs, this means that data has to be extracted from the sensor nodes, when a compromise or other security incident occurs. Among the data to be extracted are the program running on the node, so it can be analyzed for tampering, as well as the log and configuration flash memory usually stored on a separate chip on the sensor node. In this paper we will present how to perform an extraction of R…
Digital Playground
Geotechnical Investigation
Digital Photography
Digital Fortress
Digital Television
Digital Object Identifier
Digital Printing
Comparison Of Analog And Digital Recording
Digital Nas