-
61
The Strategic Measures for the Industrial Security of Small and Medium Business
Published 2014-01-01“…The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. …”
Get full text
Article -
62
Developing an Intelligent System for Efficient Botnet Detection in IoT Environment
Published 2025-04-01“…In order to achieve proper detection of hacks in the future, relevant datasets must be used. …”
Get full text
Article -
63
TBAS: Token-based authorization service architecture in Internet of things scenarios
Published 2017-07-01“…Furthermore, the token is valid only within a period of time or it will not work after the token count exceeds the threshold defined by the system, thereby lowering the devices’ risk of being hacked. The framework proposed in this article is applied to medical wearable devices. …”
Get full text
Article -
64
-
65
Deep patch‐wise supervision for presentation attack detection
Published 2022-09-01“…However, these systems are vulnerable to face presentation attacks, which are created by people who obtain biometric data covertly from a person or through hacked systems. In order to detect these attacks, convolutional neural networks (CNN)‐based systems have gained significant popularity recently. …”
Get full text
Article -
66
Consumer Protection of Girls from Cybercrime in a Gender Perspective
Published 2024-12-01“…Cybercrime covers a wide range of illegal acts carried out through the Internet or other digital devices, including fraud, identity theft, hacking, the spread of malware, to sexual exploitation of children. …”
Get full text
Article -
67
A Comprehensive Review on Limitations of Autonomous Driving and Its Impact on Accidents and Collisions
Published 2024-01-01“…It delves into prevalent limitations faced by self-driving cars, encompassing issues like adverse weather conditions, susceptibility to hacking, data security concerns, technological efficacy, testing and validation intricacies, information handling, and connectivity glitches. …”
Get full text
Article -
68
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
Published 2024-12-01“…These include the traditionally troublesome Denial of Service (DoS) attacks, key management weaknesses, and the mentioned novel threats. We discuss the hacking techniques, tools, and associated risks to the IDS framework, followed by targeted mitigation strategies and recommendations. …”
Get full text
Article -
69
A Multiscale Structural Analysis of Soft and Hard Coal Deposits in Deep High-Gas Coal Seams
Published 2021-01-01“…The pores were found to be more developed, with the edge of pores being mainly hackly. At the same time, fractures were also relatively developed, showing good connectivity. (3) From a micropore structural perspective, it was found that the BET-specific surface areas and BJH-specific surface areas of the soft coal specimens were higher than those of the hard coal specimens, which indicated that the gas adsorption and diffusion migration abilities of the soft coal were greater than those of the hard coal. (4) It was suggested from the study results that the ventilation and gas extraction processes should be strengthened in the mining activities of coal seams with high, soft stratification content. …”
Get full text
Article -
70
Cyber security laws and safety in e-commerce in India
Published 2023-06-01“…The Indian Penal Code addresses unauthorized access, hacking, identity theft, phishing, and computer virus dissemination. …”
Get full text
Article -
71
2D physically unclonable functions of the arbiter type
Published 2023-03-01“…The use of various basic elements makes it possible to improve the main characteristics of APUF, as well as to break the regularity of their structure, which was the main reason for hacking APUF through machine learning. Conclusion. …”
Get full text
Article -
72
Adoption of Electronic Records Management System in Managing Patients Records at Kabale Regional Referral Hospital.
Published 2024“…Participants gave the challenges as low service quality due to lack of qualified staff, followed by inadequate knowledge, Lack of security and privacy, technological changes, unstable power supply, additional operating costs, computer viruses, and lastly information hacking and misuse Possible ways of improving electronic records in Kabale Regional Referral Hospital were installation of anti virus soft wares which was ranked highly by the Participants followed by regular change of passwords, using only trained personnel, Restrictions on access to records, have stable power supply, Records be maintained in its Cycle, have a backup system and more workshops be provided to all records keepers at Kabale RRH for proper maintenance of records. then finally the study recommended that there is need for the hospital to increase its training programs or workshops in electronic records keeping to the record managers, recruit trained personnel and the records and information keeping department should keep viruses monitoring soft ware's updated…”
Get full text
Thesis -
73
Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Data from the device can be hacked and modified by hackers. By implementing encryption algorithms on Bluetooth Low Energy devices it can guarantee data confidentiality aspects and can prevent hackers from eavesdropping and stealing data. …”
Get full text
Article -
74
Blockchain-Based Value-Added Tax System: A Systematic Review
Published 2024-06-01“…By identifying existing challenges in electronic invoices, such as transaction forgery, the long process of issuing electronic invoices, and hacking of the central database, blockchain technology, with its features like decentralization, tamper-proofness, transparency, and automation, emerges as a suitable solution. …”
Get full text
Article -
75
Analisis Perilaku Entitas untuk Pendeteksian Serangan Internal Menggunakan Kombinasi Model Prediksi Memori dan Metode PCA
Published 2023-12-01“…Abstract Compared to other countries in the world, the level of cyber resilience in Indonesia is low as evidenced by the number of cybercrimes that occur, such as data and identity theft, fraud, and hacking of websites of government and private institutions that involve full or partial insider roles. …”
Get full text
Article -
76