-
321
FFL-IDS: A Fog-Enabled Federated Learning-Based Intrusion Detection System to Counter Jamming and Spoofing Attacks for the Industrial Internet of Things
Published 2024-12-01“…Still, IIoT compels significant cybersecurity threats beyond jamming and spoofing, which could ruin the critical infrastructure. …”
Get full text
Article -
322
A deep learning based model for diabetic retinopathy grading
Published 2025-01-01Get full text
Article -
323
A Blockchain-Based Privacy Protection Model Under Quality Consideration in Spatial Crowdsourcing Platforms
Published 2024-01-01Get full text
Article -
324
SPARQ: Efficient Entanglement Distribution and Routing in Space–Air–Ground Quantum Networks
Published 2024-01-01Get full text
Article -
325
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…Cloud security is the cybersecurity authority dedicated to securing cloud computing systems. …”
Get full text
Article -
326
A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture
Published 2025-01-01“…In this regard, this research introduces a groundbreaking approach to addressing the cybersecurity concerns associated with smart agriculture–deception technology. …”
Get full text
Article -
327
A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE
Published 2023-01-01“…Numerous intrusion detection datasets are publicly accessible for further analysis by the cybersecurity research community. However, no previous research has examined the performance of the proposed model on a variety of publicly accessible datasets in detail. …”
Get full text
Article -
328
The Impact of Digitization on Legal Systems in Developing Countries
Published 2025-01-01“…However, persistent challenges, including inadequate digital infrastructure, disparities in digital literacy, and cybersecurity vulnerabilities, underscore the need for coordinated interventions. …”
Get full text
Article -
329
Machine Learning-Based Detection of Anomalies, Intrusions, and Threats in Industrial Control Systems
Published 2025-01-01“…This research highlights the potential of ML techniques to fortify ICS cybersecurity and lays the groundwork for future advancements in critical infrastructure resilience.…”
Get full text
Article -
330
-
331
An Observer-Based Event Triggered Mechanism for the Detection and Mitigation of FDI Attacks in Deep Brain Stimulation Systems
Published 2025-01-01“…To the best of our knowledge, this is the first work focusing on the design of defense mechanisms against cybersecurity threats directed toward deep brain stimulation systems. …”
Get full text
Article -
332
AI-Based Holistic Framework for Cyber Threat Intelligence Management
Published 2025-01-01“…Nevertheless, the gathered data usually contain a large amount of content that is irrelevant to CTI or even to cybersecurity. Furthermore, most approaches concerning CTI management (e.g., gathering, analysis) involve simply gathering and storing the information without any enrichment such as classification or correlation. …”
Get full text
Article -
333
-
334
EPRNG: Effective Pseudo-Random Number Generator on the Internet of Vehicles Using Deep Convolution Generative Adversarial Network
Published 2025-01-01“…Before generating the encryption keys, a random number generator (RNG) plays an important component in cybersecurity. Several deep learning-based RNGs have been deployed to train the initial value and generate pseudo-random numbers. …”
Get full text
Article -
335
Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems
Published 2025-01-01“…Conducting penetration testing (pentesting) in cybersecurity is a crucial turning point for identifying vulnerabilities within the framework of Information Technology (IT), where real malicious offensive behavior is simulated to identify potential weaknesses and strengthen preventive controls. …”
Get full text
Article -
336
Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment
Published 2025-01-01“…The swift advancement of cyber-physical systems (CPSs) across sectors such as healthcare, transportation, critical infrastructure, and energy enhances the crucial requirement for robust cybersecurity measures to protect these systems from cyberattacks. …”
Get full text
Article -
337
The Recent Technologies to Curb the Second-Wave of COVID-19 Pandemic
Published 2021-01-01Get full text
Article -
338
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Published 2025-01-01“…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. These issues are particularly critical in electric vehicle charging stations (EVCSs) due to the sensitive data involved, such as data breaches, unauthorized access, and privacy concerns. …”
Get full text
Article -
339
ENSURING HUMAN RIGHTS IN THE CONTEXT OF IMPLEMENTATION OF ELECTRONIC VOTING IN UKRAINE: PERSPECTIVES AND RISKS
Published 2024-05-01“…However, the successful application requires comprehensive preparation, including software certification, pilot projects, personal data protection, strengthening cybersecurity, and the adoption of a special law on the use of e-voting at various levels and the introduction of e-voting as an alternative method along with traditional voting.…”
Get full text
Article -
340
An artificial insurance framework for a hydrogen-based microgrid to detect the advanced cyberattack model
Published 2025-01-01“…Albeit microgrids can gain beneficial results in cost and energy schedules once operating in grid-connected mode, such systems are vulnerable to malicious attacks from the viewpoint of cybersecurity. With this in mind, this paper explores a novel advanced attack model named the false transferred data injection (FTDI) attack aiming to manipulatively alter the power flowing from the microgrid to the upstream grid to raise voltage usability probability. …”
Get full text
Article