Showing 261 - 280 results of 358 for search '"cybersecurity"', query time: 0.04s Refine Results
  1. 261

    Deep learning for cyber threat detection in IoT networks: A review by Alyazia Aldhaheri, Fatima Alwahedi, Mohamed Amine Ferrag, Ammar Battah

    Published 2024-01-01
    “…While these innovations offer unprecedented opportunities, they also introduce complex security challenges. Cybersecurity is a pivotal concern for intrusion detection systems (IDS). …”
    Get full text
    Article
  2. 262

    Foresight study for addressing megatrends in information and communication technology (ICT) by Anastasios Andronikidis, Amalia Kouskoura, Eleni Kalliontzi, Ioannis Bakouros

    Published 2025-01-01
    “…The study highlights emerging megatrends in the ICT sector, such as AI integration, cybersecurity challenges, and the shift toward 5G, underscoring the need for continuous upskilling to remain competitive in the global market. …”
    Get full text
    Article
  3. 263

    An Evaluation of Variational Autoencoder in Credit Card Anomaly Detection by Faleh Alshameri, Ran Xia

    Published 2024-09-01
    “…Anomaly detection is one of the many challenging areas in cybersecurity. The anomaly can occur in many forms, such as fraudulent credit card transactions, network intrusions, and anomalous imageries or documents. …”
    Get full text
    Article
  4. 264

    Life Cycle Analysis in the Context of Smart Cities by Berville Charles, Croitoru Cristiana, Bode Florin

    Published 2025-01-01
    “…However, challenges such as the high energy use of ICT infrastructure, electronic waste, construction impacts, data privacy, cybersecurity risks and the digital divide are significant. …”
    Get full text
    Article
  5. 265

    Securing Cloud-Based Internet of Things: Challenges and Mitigations by Nivedita Singh, Rajkumar Buyya, Hyoungshick Kim

    Published 2024-12-01
    “…However, these technological strides have introduced new challenges, particularly in cybersecurity. IoT devices, inherently connected to the internet, are susceptible to various forms of attacks. …”
    Get full text
    Article
  6. 266

    Industry 4.0 and healthcare: Context, applications, benefits and challenges by Konstantinos Kotzias, Faiza A. Bukhsh, Jeewanie Jayasinghe Arachchige, Maya Daneva, Abhishta Abhishta

    Published 2023-06-01
    “…Next, our results show: (i) nine applications of Industry 4.0 in the Healthcare domain: Augmented Reality and Simulation, Autonomous Robotics, Cybersecurity, Big Data Analytics, Internet of Things, Cloud Computing, Additive Manufacturing and Systems Integration; and (ii) 10 benefits and nine challenges in Healthcare 4.0. …”
    Get full text
    Article
  7. 267

    Advanced Malware Detection: Integrating Convolutional Neural Networks with LSTM RNNs for Enhanced Security by Balsam Ridha Habeeb Alsaedi

    Published 2024-12-01
    “… Malware, or malicious software, is a serious threat to people, businesses, and the cybersecurity environment as a whole. Its purpose is to disrupt, damage, or obtain unauthorized access to computer systems. …”
    Get full text
    Article
  8. 268

    Federated Learning in Data Privacy and Security by Dokuru Trisha Reddy, Haripriya Nandigam, Sai Charan Indla, S. P. Raja

    Published 2024-12-01
    “…The biggest concern in federated learning is data privacy and cybersecurity. There are many algorithms that federated models have to work on to achieve greater efficiency, security, quality and effective learning. …”
    Get full text
    Article
  9. 269
  10. 270

    Power Quality Assessment and Optimization in FUZZY-Driven Healthcare Devices by Dinesh Kumar Nishad, Saifullah Khalid, Rashmi Singh

    Published 2025-01-01
    “…Key challenges, including data quality concerns, cybersecurity risks, and integration with legacy infrastructure, are discussed. …”
    Get full text
    Article
  11. 271

    ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets by Guorui Liu, Tianlin Zhang, Hualin Dai, Xinyang Cheng, Daoxuan Yang

    Published 2025-01-01
    “…Network intrusion detection models are vital techniques for ensuring cybersecurity. However, existing models face several challenges, such as insufficient feature extraction capabilities, dataset imbalance, and suboptimal detection accuracy. …”
    Get full text
    Article
  12. 272
  13. 273

    Digitization and Preservation of Academic Records: A case Study of Kabale University Registry. by Ainanani, Catherine

    Published 2024
    “…The study also identified several threats to these records, such as inadequate data security measures, insufficient storage space, cybersecurity threats, poor maintenance of digitization equipment, technological obsolescence, and potential disasters. …”
    Get full text
    Thesis
  14. 274

    Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks by Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz

    Published 2025-01-01
    “…These connected devices pose a challenge to cybersecurity systems due attacks in network communications. …”
    Get full text
    Article
  15. 275
  16. 276

    Java deserialization vulnerability defense technologybased on run-time detection by LI Yulin, CHEN Libo, LIU Yujiang, DU Wenlong, XUE Zhi

    Published 2024-04-01
    “…The discovery of deserialization vulnerabilities has garnered significant attention from cybersecurity researchers, with an increasing number of vulnerabilities being uncovered, posing severe threats to enterprise network security. …”
    Get full text
    Article
  17. 277
  18. 278

    Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly by Hussein Abdulkhaleq Saleh alsharya

    Published 2024-09-01
    “…However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities and testing security defenses. …”
    Get full text
    Article
  19. 279

    Understanding the relationship, trends, and integration challenges between lean manufacturing and industry 4.0. A literature review by Tariq Benslimane, Rajaa Benabbou, Salma Mouatassim, Jamal Benhra

    Published 2024-07-01
    “…Challenges include the need for a cultural transformation to align Lean’s simplicity with  Industry  4.0’s  complexity,  resolve  compatibility  issues  between  legacy  systems  and  new  technologies,  enhance  data  management  and  cybersecurity,  address  skill  deficiencies  through  staff  training,  and  ensure supplier and partner alignment. …”
    Get full text
    Article
  20. 280