-
241
Spoofing detection on adaptive authentication System‐A survey
Published 2022-03-01Get full text
Article -
242
-
243
A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques
Published 2024-12-01“…The research findings not only contribute to the theoretical and practical concerns about the effective protection of IIoT systems but also offer hope for the future of cybersecurity in these systems.…”
Get full text
Article -
244
Resilient Event Triggered Interval Type-2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks
Published 2024-01-01“…However, over the past few years, cybersecurity threats have posed significant challenges to such systems, given the ever-evolving automotive industry. …”
Get full text
Article -
245
-
246
Analysis of the implications of digital voting through neutrosophic Delphi modeling
Published 2024-11-01“…Future research should focus on enhancing cybersecurity and digital education to foster trust in electronic voting systems further.…”
Get full text
Article -
247
Comparative evaluation between Java application using JNI and native C/C++ application running on an Android platform.
Published 2025-01-01“…This article evaluated the performance difference between Java applications using JNI with the NDK and native C/C++ applications, focusing on algorithms widely used in various areas such as automation, networking, telecom, cybersecurity, etc. We conducted sequence of executions initiated either through a graphical interface or via the Android Debug Bridge (ADB) command line, with timing performed by external hardware with its own firmware for this evaluation. …”
Get full text
Article -
248
A Detection Method Against Load Redistribution Attacks in the Interdependence of the Natural Gas Network and Power System Based on Entropy
Published 2023-09-01“…However, the advanced information and communication equipment in these integrated electricity-gas energy systems give rise to cybersecurity concerns. This research proposes an entropy-based load redistribution (LR) attack detection approach for such integrated networks. …”
Get full text
Article -
249
Mining Community-Level Influence in Microblogging Network: A Case Study on Sina Weibo
Published 2017-01-01“…Social influence analysis is important for many social network applications, including recommendation and cybersecurity analysis. We observe that the influence of community including multiple users outweighs the individual influence. …”
Get full text
Article -
250
A Survey of Deep Anomaly Detection in Multivariate Time Series: Taxonomy, Applications, and Directions
Published 2025-01-01“…Multivariate time series anomaly detection (MTSAD) can effectively identify and analyze anomalous behavior in complex systems, which is particularly important in fields such as financial monitoring, industrial equipment fault detection, and cybersecurity. MTSAD requires simultaneously analyze temporal dependencies and inter-variable relationships have prompted researchers to develop specialized deep learning models to detect anomalous patterns. …”
Get full text
Article -
251
Optimizing PoS agent banking for inclusive rural economies:
Published 2024-12-01“…However, the success of PoS banking is hindered by cybersecurity risks, fraud, agent credibility issues, and physical security threats like robbery. …”
Get full text
Article -
252
-
253
-
254
Prerequisites for the legal mechanisms development to combat disinformation in social media in the context of national security: problem statement
Published 2021-12-01“…In the context of capacity building of the Centre for Countering Disinformation, counteracting disinformation campaigns for national security reasons requires a combination of efforts of the Centre with the national cybersecurity system, and with regulatory bodies of the media, strategic communications units of Ukraine Government in close cooperation with the private sector, primarily social media companies, and civil society. …”
Get full text
Article -
255
-
256
Digital Transformation and Performance Optimization at XYZ Higher Education through TOGAF-Based Enterprise Architecture
Published 2024-11-01“…A central goal of XYZ University’s digital transformation efforts is to streamline its business processes and bolster its cybersecurity framework. These initiatives are critical to the university’s broader strategy of developing a robust Enterprise Architecture (EA). …”
Get full text
Article -
257
Transforming Alliances: A 20-Year Overview of Singapore-US Relations under Lee Hsien Loong
Published 2025-01-01“…It also examines how both countries have expanded their cooperation into non-traditional security areas such as counterterrorism, cybersecurity, and environmental security, adapting to the evolving global security environment. …”
Get full text
Article -
258
An Algorithm for Improving Email Security on the Android Operating System in the Industry 4.0 Era
Published 2021-01-01“…With several technologies shaping industry 4.0 epoch, notably, its cybersecurity entails the security of communication and network operations activities. …”
Get full text
Article -
259
Development of an Intelligent Communication Platform for Remote Practical Work in Education: Integrating AR, VR, and Cloud Technologies
Published 2024-01-01“…Key features include real-time collaboration, personalized learning experiences, and seamless access to virtual labs, all supported by robust cybersecurity measures and scalable infrastructure. The platform integrates with existing learning management systems (LMS) to provide a flexible and secure learning environment. …”
Get full text
Article -
260
Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments
Published 2024-12-01“…Establishing robust cybersecurity for Internet of Things (IoT) ecosystems poses significant challenges for system operators due to IoT resource constraints, trade-offs between security and performance, diversity of applications, and their security requirements, usability, and scalability. …”
Get full text
Article