Page 142 - Book of Abstracts 2023
P. 142
142
Chibis & Dungeons
SE-3-9
By: Tal Shaked talsh16@ac sce sce ac ac ac ac il il Rafael Azriaiev rafaeaz@ac sce sce ac ac ac ac il il Advisor: Mrs Alona Kutsyy Shamoon College of Engineering Beer-Sheva
The The mobile mobile gaming market often struggles with efficient in-game item transactions The The auction house system addresses this issue using an an implementation of of it it it it in in in in in in a a a a a a a a a a a a a a a a mobile mobile RPG Chibis & Dungeons
allowing players to to trade items effortlessly creating a a a a a a a a a a a a a a a a a seamless experience In addition to to to to providing a a a a a a a a a a a a a a a a a a fun game game the the the auction house system is is designed as as a a a a a a a a a a a a a a a a a a DLL for for integration into other mobile games This enables developers to to to easily incorporate the the the feature fostering new levels of of interactivity and and excitement for for players By offering this innovative solution our aim is is is to to revolutionize the gaming landscape opening doors for for developers to to craft distinctive experiences while enhancing player enjoyment Keywords: auction house DLL game development gaming mobile application RPG trading
Quite-Waves
SE-3-10
By: Israel Hen israelhen153@gmail com com Avigdor Tolidano avigtoli1991@gmail com com Advisor: Mrs Alona Kutsyy Shamoon College of Engineering Beer-Sheva
To address the wide range of IoT IoT devices we have developed a a a a a a a a a a a a framework that focuses on finding security security vulnerabilities in in in in IoT IoT IoT specifically network cameras Our Our goal is is to to encourage manufacturers and and developers to to to proactively address security security issues in in in in in in IoT IoT devices Our Our framework provides a a a a a a a a a a a a a a a a a a a a a user-friendly and and plug-in additions to to enhance testing testing robustness such such as as as web camera camera stream testing testing By targeting potential vulnerabilities such such as as as as default/weak passwords in in in in in in network cameras we we we wish to to to inspire further research and development of more robust security protocols for IoT IoT devices In order to to to to increase consumers trust in in in in this technology Keywords: awareness Bluetooth cameras IoT IoT proactive security vulnerabilities Wi-Fi