-
301
Until you have something to lose! Loss aversion and two-factor authentication adoption
Published 2025-01-01“…Originality/value – Authentication is one of the most important topics in cybersecurity that is related to human-computer interaction. …”
Get full text
Article -
302
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Get full text
Article -
303
Integrating artificial intelligence in energy transition: A comprehensive review
Published 2025-01-01“…It also highlights the potential of AI to advance energy system stability, address cybersecurity risks, and promote equitable and sustainable energy systems. …”
Get full text
Article -
304
Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI Strategies
Published 2025-01-01“…Considering the current weaknesses and threats related to GAI we provide a systematic approach to how safety concerns that are currently relevant can be integrated with every stage of Artificial Intelligence (AI) lifecycle management: from continuous monitoring to the application of cybersecurity trends and practices, etc. In our approach, the emphasis is placed on the multi-level security management strategy that incorporates the improvement of coding practices, validation and testing, and the implementation of advanced intrusion detection systems. …”
Get full text
Article -
305
Navigating the Challenges and Opportunities of Securing Internet of Autonomous Vehicles With Lightweight Authentication
Published 2025-01-01“…These challenges cannot be directly addressed by standard cybersecurity solutions designed primarily for static IoT environments. …”
Get full text
Article -
306
GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks
Published 2024-12-01“…The widespread adoption of web services has heightened exposure to cybersecurity threats, particularly SQL injection (SQLi) attacks that target the database layers of web applications. …”
Get full text
Article -
307
THE IMPACT OF COVID-19 ON THE IT SECTOR: WAS THE ADJUSTMENT AS EASY AS IT SEEMED? THE CASE OF CROATIA
Published 2022-05-01“…In addition, this paper answers whether and to what extent IT companies had to adapt their business models and what other challenges (cybersecurity, new platforms, etc.) they had to respond to. …”
Get full text
Article -
308
Perspectives of implementing software packaged system “Personnel Management System of the National Police of Ukraine” into the activities of the National Police of Ukraine
Published 2018-11-01“…It has been alleged that the software package system “Personnel Management System of the National Police of Ukraine”, which was fully designed and developed by the employees of the research laboratory dealing with information protection and cybersecurity of Kharkiv National University of Internal Affairs customized by the Human Resourcing Department of the National Police of Ukraine, has no analogues among domestic and foreign software products. …”
Get full text
Article -
309
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01Get full text
Article -
310
A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats
Published 2025-01-01“…While primarily evaluated on synthetic datasets, the high accuracy of the DS-IID model suggests its potential as a valuable tool for real-world cybersecurity applications.…”
Get full text
Article -
311
Opportunities and challenges halal tourism in Indonesia in the era of human-centered technology (society 5.0)
Published 2024-11-01“…However, major challenges are still faced related to standardization, infrastructure quality, human resource quality, global competition, and cybersecurity risks. Overcoming these challenges requires a collaborative strategy between the government and the private sector, utilization of technology for efficiency and safety, improving the quality of human resources, and more intensive promotion in both domestic and international markets. …”
Get full text
Article -
312
DNA methylation biomarker analysis from low-survival-rate cancers based on genetic functional approaches
Published 2025-01-01Get full text
Article -
313
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Published 2024-01-01“…Despite providing unparalleled connectivity and convenience, the exponential growth of the Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These concerns stem from various factors, including the heterogeneity of IoT devices, widespread deployment, and inherent computational limitations. …”
Get full text
Article -
314
ADA-NAF: Semi-Supervised Anomaly Detection Based on the Neural Attention Forest
Published 2025-01-01“…Our results validate the ADA-NAF’s effectiveness and versatility as a robust solution for real-world anomaly detection challenges with promising applications in cybersecurity, industrial monitoring, and healthcare diagnostics. …”
Get full text
Article -
315
Testing convolutional neural network based deep learning systems: a statistical metamorphic approach
Published 2025-01-01“…., healthcare, autonomous driving, finance, manufacturing, cybersecurity, etc. Metamorphic testing (MT) is considered a simple but very powerful approach in testing such computationally complex systems for which either an oracle is not available or is available but difficult to apply. …”
Get full text
Article -
316
The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs):
Published 2025“…Also, it was found that building workforce capacity through collaborations and customized training programs can help close the skills gap, while improving cybersecurity and implementing efficient data management frameworks can help with privacy issues. …”
Get full text
Article -
317
Using ChatGPT for medical education: the technical perspective
Published 2025-02-01Get full text
Article -
318
Enterprises as Complex Systems: Navigating Challenges and Embracing Resilience
Published 2024-10-01“…Technological advancements, including artificial intelligence, the Internet of Things, and big data, add layers of operational complexity, demanding robust data management, cybersecurity measures, and seamless integration with legacy systems. …”
Get full text
Article -
319
Aukus (Australia-united kingdom-united states) threat to Indo-pacific security
Published 2024-11-01“…Countries can provide funding to enhance their cybersecurity capabilities, which could include investing in cyber defense measures to protect critical military infrastructure and networks. …”
Get full text
Article -
320
An efficient convolution neural network method for copy-move video forgery detection
Published 2025-01-01Get full text
Article