Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
481
GraphFedAI framework for DDoS attack detection in IoT systems using federated learning and graph based artificial intelligence
Published 2025-08-01“…Federated learning is incorporated to maintain data privacy by training models locally on each device without sharing raw data. …”
Get full text
Article -
482
Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems
Published 2024-10-01“…This framework combines state-of-the-art machine learning and deep learning models, which are used in both centralized and federated learning configurations, to boost the detection of false data injection attacks in cyber-physical power systems. …”
Get full text
Article -
483
Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption
Published 2025-06-01“…Homomorphic Encryption (HE) introduces new dimensions of security and privacy within federated learning (FL) and internet of things (IoT) frameworks that allow preservation of user privacy when handling data for FL occurring in Smart Grid (SG) technologies. …”
Get full text
Article -
484
Fused federated learning framework for secure and decentralized patient monitoring in healthcare 5.0 using IoMT
Published 2025-07-01“…Abstract Federated Learning (FL) enables artificial intelligence frameworks to train on private information without compromising privacy, which is especially useful in the medical and healthcare industries where the knowledge or data at hand is never enough. …”
Get full text
Article -
485
Scalable architecture for autonomous malware detection and defense in software-defined networks using federated learning approaches
Published 2025-08-01“…Our architecture minimizes privacy risks by ensuring that raw data never leaves the device; only model updates are shared for aggregation at the global level. …”
Get full text
Article -
486
Legal grounds for police officers' body-worn cameras
Published 2025-01-01“…The use of these cameras is based on legal provisions which authorize police officers to record their actions, collect and process personal data. …”
Get full text
Article -
487
-
488
Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection
Published 2025-01-01“…This study examines privacy calculus in online child sexual abuse material (CSAM) detection across Europe, using Flash Eurobarometer 532 data. …”
Get full text
Article -
489
COVID-19 Tracing Apps as a Legal Problem: An Investigation of the Norwegian ‘Smittestopp’ App
Published 2021-12-01“…This raises ethical and legal questions, as these apps have the potential to be used for surveillance of the population. There is pressure to set privacy and data protection aside to allow extensive collection and processing of personal data, while the benefits of the apps remain uncertain. …”
Get full text
Article -
490
-
491
Older people and the smart city – Developing inclusive practices to protect and serve a vulnerable population
Published 2023-03-01“…Using examples from three European locations – Helsinki, Flanders and Santander – we describe and discuss how we can gather personal data related to the daily lives of older people in terms of the existing privacy and data protection laws in the EU. …”
Get full text
Article -
492
-
493
Public Perceptions of Ethical Challenges and Opportunities for Enterprises in the Digital Age
Published 2025-06-01“…Statistical analysis demonstrated positive and significant associations: Data privacy and ethical prioritisation (t-value = 45, p < 0.001), Algorithmic ethics and ethical prioritisation (B = 0.35, p = 0.004), Factor analysis identified three critical variables: data privacy and security, ethical algorithms and workforce displacement accounted for 75% of the variance on average. …”
Get full text
Article -
494
Social Media Suicide Watch
Published 2025-07-01“…There was an immediate backlash due to concerns over privacy and the potential for stalkers and bullies to misuse this data and encourage suicide or self-harm, like Roy’s girlfriend did. …”
Get full text
Article -
495
Redefining customer connections in the UAE’s digital era: A study on emerging technological synergies
Published 2025-06-01“…This study investigates the socio-technical implications of IoT integration, particularly its effects on operational efficiency, customer engagement, digital inclusivity, ethical data practices, and sustainability. The research used a quantitative cross-sectional survey conducted from February to April 2024 across the UAE. …”
Get full text
Article -
496
Democratic Oversight of Government Hacking by Intelligence Agencies
Published 2025-06-01Get full text
Article -
497
Optimization of machine learning methods for de-anonymization in social networks
Published 2025-03-01“…Anonymity features are widely used to help individuals maintain their privacy, but they can also be exploited for malicious purposes. …”
Get full text
Article -
498
Social Implications of Technological Advancements in Sentiment Analysis: A Literature Review on Potential and Consequences over the Next 20 Years
Published 2025-02-01“…It enables more responsive policy design by understanding public emotions in political and social contexts. However, data privacy, misinformation, and diminished critical thinking persist. …”
Get full text
Article -
499
Artificial Intelligence-Driven Facial Image Analysis for the Early Detection of Rare Diseases: Legal, Ethical, Forensic, and Cybersecurity Considerations
Published 2024-06-01“…Current and future developments must focus on securing AI models against attacks, ensuring data integrity, and safeguarding the privacy of individuals within this technological landscape.…”
Get full text
Article -
500
Blockchain-powered wireless sensor networks: enhancing security and privacy in the IoT era
Published 2023-06-01Get full text
Article