Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    REVIEW

    The Metaverse Review: Exploring the Boundless Ream of Digital Reality

    Shi Dong*, Mengke Liu, Khushnood Abbas

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3451-3498, 2024, DOI:10.32604/cmc.2024.055575 - 19 December 2024

    Abstract The metaverse has emerged as a prominent topic with growing interest fueled by advancements in Web 3.0, blockchain, and immersive technologies. This paper presents a thorough analysis of the metaverse, showcasing its evolution from a conceptual phase rooted in science fiction to a dynamic and transformative digital environment impacting various sectors including gaming, education, healthcare, and entertainment. The paper introduces the metaverse, details its historical development, and introduces key technologies that enable its existence such as virtual and augmented reality, blockchain, and artificial intelligence. Further this work explores diverse application scenarios, future trends, and critical More >

  • Open Access

    ARTICLE

    MV-Honeypot: Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms

    Arpita Dinesh Sarang1, Mohsen Ali Alawami2, Ki-Woong Park3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 655-669, 2024, DOI:10.32604/cmes.2024.053434 - 20 August 2024

    Abstract Nowadays, the use of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes. Therefore, the Avatar and Metaverse are being developed with a new theory, application, and design, necessitating the association of more personal data and devices of targeted users every day. This Avatar and Metaverse technology explosion raises privacy and security concerns, leading to cyber attacks. MV-Honeypot, or Metaverse-Honeypot, as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities, should be developed. To fill this gap, we study user’s More > Graphic Abstract

    MV-Honeypot: Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms

Displaying 1-10 on page 1 of 2. Per Page