-
261
Deep learning for cyber threat detection in IoT networks: A review
Published 2024-01-01“…While these innovations offer unprecedented opportunities, they also introduce complex security challenges. Cybersecurity is a pivotal concern for intrusion detection systems (IDS). …”
Get full text
Article -
262
Foresight study for addressing megatrends in information and communication technology (ICT)
Published 2025-01-01“…The study highlights emerging megatrends in the ICT sector, such as AI integration, cybersecurity challenges, and the shift toward 5G, underscoring the need for continuous upskilling to remain competitive in the global market. …”
Get full text
Article -
263
An Evaluation of Variational Autoencoder in Credit Card Anomaly Detection
Published 2024-09-01“…Anomaly detection is one of the many challenging areas in cybersecurity. The anomaly can occur in many forms, such as fraudulent credit card transactions, network intrusions, and anomalous imageries or documents. …”
Get full text
Article -
264
Life Cycle Analysis in the Context of Smart Cities
Published 2025-01-01“…However, challenges such as the high energy use of ICT infrastructure, electronic waste, construction impacts, data privacy, cybersecurity risks and the digital divide are significant. …”
Get full text
Article -
265
Securing Cloud-Based Internet of Things: Challenges and Mitigations
Published 2024-12-01“…However, these technological strides have introduced new challenges, particularly in cybersecurity. IoT devices, inherently connected to the internet, are susceptible to various forms of attacks. …”
Get full text
Article -
266
Industry 4.0 and healthcare: Context, applications, benefits and challenges
Published 2023-06-01“…Next, our results show: (i) nine applications of Industry 4.0 in the Healthcare domain: Augmented Reality and Simulation, Autonomous Robotics, Cybersecurity, Big Data Analytics, Internet of Things, Cloud Computing, Additive Manufacturing and Systems Integration; and (ii) 10 benefits and nine challenges in Healthcare 4.0. …”
Get full text
Article -
267
Advanced Malware Detection: Integrating Convolutional Neural Networks with LSTM RNNs for Enhanced Security
Published 2024-12-01“… Malware, or malicious software, is a serious threat to people, businesses, and the cybersecurity environment as a whole. Its purpose is to disrupt, damage, or obtain unauthorized access to computer systems. …”
Get full text
Article -
268
Federated Learning in Data Privacy and Security
Published 2024-12-01“…The biggest concern in federated learning is data privacy and cybersecurity. There are many algorithms that federated models have to work on to achieve greater efficiency, security, quality and effective learning. …”
Get full text
Article -
269
AI-based model for securing cognitive IoT devices in advance communication systems
Published 2025-12-01Get full text
Article -
270
Power Quality Assessment and Optimization in FUZZY-Driven Healthcare Devices
Published 2025-01-01“…Key challenges, including data quality concerns, cybersecurity risks, and integration with legacy infrastructure, are discussed. …”
Get full text
Article -
271
ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets
Published 2025-01-01“…Network intrusion detection models are vital techniques for ensuring cybersecurity. However, existing models face several challenges, such as insufficient feature extraction capabilities, dataset imbalance, and suboptimal detection accuracy. …”
Get full text
Article -
272
Big data analytics and AI as success factors for online video streaming platforms
Published 2025-02-01Get full text
Article -
273
Digitization and Preservation of Academic Records: A case Study of Kabale University Registry.
Published 2024“…The study also identified several threats to these records, such as inadequate data security measures, insufficient storage space, cybersecurity threats, poor maintenance of digitization equipment, technological obsolescence, and potential disasters. …”
Get full text
Thesis -
274
Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Published 2025-01-01“…These connected devices pose a challenge to cybersecurity systems due attacks in network communications. …”
Get full text
Article -
275
A New Approach to Estimate Concentration Levels with Filtered Neural Nets for Online Learning
Published 2022-01-01Get full text
Article -
276
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01“…The discovery of deserialization vulnerabilities has garnered significant attention from cybersecurity researchers, with an increasing number of vulnerabilities being uncovered, posing severe threats to enterprise network security. …”
Get full text
Article -
277
-
278
Leveraging Social Engineering Techniques for Ethical Purposes: An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly
Published 2024-09-01“…However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities and testing security defenses. …”
Get full text
Article -
279
Understanding the relationship, trends, and integration challenges between lean manufacturing and industry 4.0. A literature review
Published 2024-07-01“…Challenges include the need for a cultural transformation to align Lean’s simplicity with Industry 4.0’s complexity, resolve compatibility issues between legacy systems and new technologies, enhance data management and cybersecurity, address skill deficiencies through staff training, and ensure supplier and partner alignment. …”
Get full text
Article -
280
An Ultrasound Prototype for Remote Hand Movement Sensing: The Finger Tapping Case
Published 2024-12-01Get full text
Article