Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1961
Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review
Published 2025-03-01“…These gaps include design requirements, software and firmware updates, physical security, the use of big data to detect vulnerabilities, user data privacy, and inconsistencies in machine learning algorithms. …”
Get full text
Article -
1962
SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare
Published 2024-12-01“…We leverage the blockchain-based Self-Sovereign Identity (SSI) model to handle client authentication and secure communication. Additionally, we use the Trimmed Mean method to aggregate data. This helps reduce the effect of unusual or malicious inputs when creating the overall model. …”
Get full text
Article -
1963
Human-machine in the vortex of digital synergy
Published 2025-05-01“…Using data from 1232 respondents (aged 15+), collected via a quota-based online survey from April 8 to April 26, 2024, logistic regression analyses investigated two key questions: (1) Does increased use of virtual assistants correlate with a higher likelihood of ChatGPT adoption? …”
Get full text
Article -
1964
Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
Published 2024-01-01“…Our approach prioritizes data privacy by processing data locally, thereby avoiding the need for central data collection, while enhancing detection efficiency. …”
Get full text
Article -
1965
Deep learning in the fog
Published 2019-08-01“…In this article, we show from four perspectives, namely, hardware, software libraries, platforms, and current applications, the landscape of components used for developing intelligent Internet of Things solutions located near where the data are generated. …”
Get full text
Article -
1966
Mathematical Modeling of Multiattack Behavior Discrimination in the WSN Based on Incidence Matrix
Published 2022-01-01“…The WSN node model is used to collect relevant data and mark and map the disguised data, so as to determine the characteristics of multiattack behavior and establish the WSN multiattack behavior discrimination model based on the incidence matrix. …”
Get full text
Article -
1967
Studies on Artificial Intelligence’s Effect on the Employment Market in the Future
Published 2024-01-01“…At the same time, the application of AI also raises concerns about privacy, data security, and ethical issues, all of which need to be considered in the development of the job market. …”
Get full text
Article -
1968
Understanding customer loyalty in digital services: insights from food delivery in emerging markets
Published 2025-07-01“…Grounded in the Commitment-Trust Theory and the SERVQUAL model, this study examines how these factors collectively influence consumer behavior in an emerging market. Data were collected via survey questionnaires from 324 Cambodian respondents and analyzed using partial least squares–structural equation modeling (PLS–SEM). …”
Get full text
Article -
1969
A Novel Raster Map Exchange Scheme Based on Visual Cryptography
Published 2021-01-01“…Raster map is an image that has been discretized in space and brightness, and it is an important carrier of geospatial data. With the rapid development of Internet and big data technologies, preserving the privacy of raster map has become an urgent task. …”
Get full text
Article -
1970
Assessing user preferences and competitive strategies of Gojek and Grab in ASEAN’s ride-hailing market
Published 2024-12-01“…This study aims to determine the criteria, sub-criteria, and alternatives influencing users in choosing ride-hailing and map Gojek and Grab’s grand strategy to compete in the ASEAN market, especially in Indonesia, Thailand, Vietnam, and Singapore. This research uses a questionnaire to collect data, with 377 Gojek and Grab users as participants. …”
Get full text
Article -
1971
Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks
Published 2017-01-01“…The proposed protocol includes steps for secure RO and handover management, where mutual authentication, key exchange, perfect forward secrecy, and privacy are supported. The correctness of the proposed protocol is formally analyzed using BAN-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). …”
Get full text
Article -
1972
Antecedents of trust in online environment: A case of Pakistan
Published 2016-03-01“…SPSS was used to analyze the data and three techniques descriptive statistics, regression analysis and correlation analysis are applied. …”
Get full text
Article -
1973
Vision-Based Activity Recognition for Unobtrusive Monitoring of the Elderly in Care Settings
Published 2025-05-01“…The system integrates a frame differencing algorithm with adjustable sensitivity parameters and an anomaly detection model tailored to identify deviations from individual behavior patterns without relying on large volumes of labeled data. The system was validated through real-world deployments across multiple care home rooms, demonstrating significant improvements in emergency response times and ensuring resident privacy through anonymized frame differencing views. …”
Get full text
Article -
1974
A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption
Published 2024-12-01“…Cryptography ensures secure communication and data privacy, and it has been increasingly applied in healthcare and related areas. …”
Get full text
Article -
1975
Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection
Published 2025-01-01“…The widespread use of the internet has led to frequent cryptographic attack event incidents, which pose various risks, including the leakage of personal information, privacy data, identity theft, and potential legal liabilities. …”
Get full text
Article -
1976
Labor companionship utilization and healthcare providers perceptions in Gondar public health facilities: a mixed method study
Published 2025-08-01“…Data were transcribed, translated, and thematically analyzed by using open code software 4.03. …”
Get full text
Article -
1977
Entrepreneurial strategies for sustainable growth: a deep dive into cloud-native technology and its applications
Published 2025-02-01“…The policymaker's and enterprises' focus and actionable intervention are necessary for developing mechanisms to solve the barriers of regulatory compliance, lack of skilled manpower, data security, privacy issues, and upfront investment for entrepreneurial success.…”
Get full text
Article -
1978
eHealth Technology: What Do We Know and What do We Need to Learn
Published 2021-06-01“…<p>eHealth is the use of information and communication technologies for health. eHealth serves multiple utilization purposes for storage, exchange, and retrieval of digital data for administrative, clinical, educational and research purposes. …”
Get full text
Article -
1979
A lightweight authentication and key agreement scheme for smart grid
Published 2017-02-01“…The security of advanced metering infrastructure is special importance for smart grid. In order to achieve data confidentiality, privacy, and authentication in advanced metering infrastructure, a lightweight authentication and key agreement scheme is proposed in this article. …”
Get full text
Article -
1980
Federated Learning for Predicting Major Postoperative Complications
Published 2025-06-01“…To develop a robust model to accurately predict the risk of postoperative complications using clinical data from multiple institutions while ensuring data privacy. …”
Get full text
Article