-
201
Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks
Published 2025-01-01“…Yet, decentralization introduces security vulnerabilities, including spoofing, tampering, and denial-of-service attacks, which can compromise the reliability and safety of vehicular communications. …”
Get full text
Article -
202
Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources
Published 2021-01-01“…This paper sorts according to the value of the Internet information security model, obtains the optimal model to avoid human tampering, and designs the information resource acquisition process to ensure the reliability of the source data. …”
Get full text
Article -
203
Toward efficient authentication for space-air-ground integrated Internet of things
Published 2019-07-01“…While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. …”
Get full text
Article -
204
Towards Reliable Participation in UAV-Enabled Federated Edge Learning on Non-IID Data
Published 2024-01-01“…Indeed, FL can be targeted by poisoning attacks, in which malicious UAVs upload poisonous local models to the FL server, by either providing targeted false predictions for specifically chosen inputs or by compromising the global model's accuracy through tampering with the local model. Hence, we propose in this article a novel client selection scheme that enhances convergence by prioritizing fast UAVs with high-reliability scores, while eliminating malicious UAVs from training. …”
Get full text
Article -
205
Is there a risk of esketamine misuse in clinical practice?
Published 2025-01-01“…More importantly, no register of illicit acquisition of esketamine or its tampering for obtaining ketamine or other altered products was found in our search. …”
Get full text
Article -
206
Dual medical image watermarking using SRU-enhanced network and EICC chaotic map
Published 2024-12-01“…In this study, a dual watermarking scheme based on SRU-ConvNeXt V2 (SCNeXt) model and exponential iterative-cubic-cosine (EICC) chaotic map is proposed for medical image integrity verification, tamper localization, and copyright protection. A logo image for integrity verification is embedded into the region of interest within the medical image, and a text image containing copyright information is combined with the feature vectors extracted by SCNeXt for generating zero-watermark information. …”
Get full text
Article -
207
A literature review on transformative impacts of blockchain technology on manufacturing management and industrial engineering practices
Published 2025-07-01“…As business performance increasingly depends on decentralized, tamper-proof records to manage transactions and data flows, adopting blockchain technology (BCT) is becoming crucial for remaining competitive in the digital and globalized economy. …”
Get full text
Article -
208
Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment
Published 2025-01-01“…Blockchain (BC) aided intrusion detection from IoT platforms provides many benefits, including better data integrity, transparency, and resistance to tampering. This paper projects a novel sandpiper optimizer with hybrid deep learning-based intrusion detection (SPOHDL-ID) from the BC-assisted IoT platform. …”
Get full text
Article -
209
Research on Public Administration and Resource Allocation Based on Blockchain and Structured Occupational Therapy
Published 2022-01-01“…In the original trust system of resource allocation, the blockchain and structured occupational therapy realizes the reconstruction of the trust system by preventing information tampering, using information encryption technology, and using information traceability technology. …”
Get full text
Article -
210
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01“…PUFs offer a hardware-based security mechanism that is resistant to cloning and tampering, ensuring that the encryption keys remain secure against both classical and quantum attacks. …”
Get full text
Article -
211
Enhancing Digital Identity and Access Control in Event Management Systems Using Sui Blockchain
Published 2025-01-01“…The proposed system incorporates several innovative features: Tickets to the System: Utilizing the concept of NFT, the system guarantees that each ticket is unique, is tamper proof and cannot be forged. It also ensures the validity of tickets and at the same time ensures that the ticket is transferable back and forth while the ownership of the ticket is wholly and clearly disclosed. zkLogin for Seamless User Authentication: zkLogin is then implemented in the platform to ensure users can be authenticated in a Privacy-Preserving manner while at the same time having High Security. …”
Get full text
Article -
212
A multi-model feature fusion based transfer learning with heuristic search for copy-move video forgery detection
Published 2025-02-01“…Next, the ECMVFD-FTLTDO technique employs a fusion-based transfer learning (TL) process comprising three models: ResNet50, MobileNetV3, and EfficientNetB7 to capture diverse spatial features across various scales, thereby enhancing the capability of the model to distinguish authentic content from tampered regions. The ECMVFD-FTLTDO approach utilizes an Elman recurrent neural network (ERNN) classifier for the detection process. …”
Get full text
Article -
213
Smart blockchain-powered natural resource asset management and ecological governance countermeasures
Published 2025-01-01“…Firstly, the necessity and feasibility of blockchain empowering resource-based urban ecological governance are analyzed, demonstrating its unique potential in addressing traditional governance challenges through decentralization, transparency, and tamper resistance. Secondly, a framework for natural resource management services based on blockchain is constructed, offering new technological support for ecological governance. …”
Get full text
Article -
214
Enhancing privacy and traceability of public health insurance claim system using blockchain technology
Published 2025-02-01“…The system’s layered design and use of smart contracts guarantee transparent, tamper-proof record-keeping, while parallelized processes in the logical architecture streamline claims handling. …”
Get full text
Article -
215
Implementasi Teknik Enkripsi dan Dekripsi dI File Video Menggunakan Algoritma Blowfish
Published 2019-12-01“…This type of data in the form of files that have the potential to be "tampered" illegally not only with the .doc extension can be the file type with the video file extension. …”
Get full text
Article -
216
Impact of road infrastructure equipment on the environment and surroundings
Published 2022-04-01“…The emissions of carbon dioxide, carbon monoxide, nitrogen dioxide, hydrocarbons, and particulate matter were analyzed.METHODS: Six road infrastructure equipment were sampled consisting of an excavator, roller, grader, concrete mixer, tamper, and wheel loader, obtained from a case study project in Kampala city, Uganda. …”
Get full text
Article -
217
Yoruba Epistemology, Art, Language and the Universe of Meanings: A Meta-Analysis
Published 2021-12-01“…The corollary is that such attempt will of necessity tamper with the sacred epistemological authenticity of the language-art-culture continuum. …”
Get full text
Article -
218
Blockchain-Based Value-Added Tax System: A Systematic Review
Published 2024-06-01“…By identifying existing challenges in electronic invoices, such as transaction forgery, the long process of issuing electronic invoices, and hacking of the central database, blockchain technology, with its features like decentralization, tamper-proofness, transparency, and automation, emerges as a suitable solution. …”
Get full text
Article