2.1 Classification of Steganography
3.1 Product flow structure in traditional business
3.2 Communication cycle in e-business, from manufacturer to customer
4.1 Two-tier e-commerce architecture
4.2 Three-tier e-commerce architecture
4.7 Cross-site scripting attack
4.8 Security engineering life cycle
5.4 Motives of the attackers over the years
6.1 Blockchain architecture diagram
6.2 Network architecture of blockchain
6.3 How transactions get converted to blocks
6.4 Cryptocurrency transaction using blockchain technology
6.5 How double spending may occur
6.6 Blockchain generation from unordered transactions
7.1 Challenges of a distributed system
7.2 Shared secret key-based authentication
7.3 Role of KDC in authentication
7.4 Public key encryption based on mutual authentication
7.6 Schematic of a sandbox and a playground
9.3 Obtained non-dominated solutions for the parallel workflow
9.4 Obtained non-dominated solutions for the hybrid workflow
9.5 Obtained non-dominated solutions for the synthetic workflow
11.1 Internet Crime Complaint Center(IC3) public value of overall statistics 2016
11.2 Pyramid of cybersecurity 2017
11.3 Expert-level-awareness of cybersecurity
11.4 Effective incident response plans
11.5 Federal government cybersecurity initiatives
11.6 Blockchain secure Internet transactions
12.1 Classification of mobile security threats
12.2 Various mobile phone-related crimes
12.3 The schematic sequence of a SMiShing attack
13.1 Issues of cybersecurity [4]
13.2 Cybersecurity attacks occurring in different years [8]
13.3 Malware attacks on smartphone OSes
14.1 Logical organization of distributed systems into various layers
14.2 Basic elements of information system security
14.3 Schematic showing the exchange of information in distributed systems
14.4 Types of external attacks
14.6 Globus security policy architecture
15.1 General architecture of healthcare monitoring systems
15.2 Categorization of attacks in healthcare system
15.3 Schematic diagram of a captured communication by an eavesdropper in fog environment
15.4 Schematic diagram of a distributed denial of service attack
16.1 Ecosystem for setting up of an Open, closed and semi-closed e-wallet respectively [2]
16.2 Research Model for the mapping of features of E-wallets with the types of e-wallets
18.220.16.184