-
341
Advances in colorectal cancer diagnosis using optimal deep feature fusion approach on biomedical images
Published 2025-02-01Get full text
Article -
342
SLM-DFS: A systematic literature map of deepfake spread on social media
Published 2025-01-01“…The findings of this literature map suggest that DF detection is a multidisciplinary field that requires collaboration between experts in computer vision, machine learning, cybersecurity, and media forensics to address its current and future challenges…”
Get full text
Article -
343
IMCMK-CNN: A lightweight convolutional neural network with Multi-scale Kernels for Image-based Malware Classification
Published 2025-01-01“…Through these investigations, our goal is to construct a detection system that is both more precise and efficient, capable of addressing the ever-evolving threats to cybersecurity. Pursuing research in this direction is not only vital for enhancing network security defenses and safeguarding user data, but it will also foster the advancement of related state-of-the-art technologies and further mitigate the economic and societal repercussions of malware attacks. …”
Get full text
Article -
344
-
345
Cloud Platform Selection Model in the Framework of Differential Quality Game With Fuzzy Information
Published 2025-01-01“…The results of the study may be useful to analysts dealing with cloud solution selection problems under uncertainty and cybersecurity needs. The relevance of the study is due to the global trend of business processes moving to the cloud and the increasing requirements for data security in the digitalization of the economy, which makes the choice of an optimal cloud platform strategically significant. …”
Get full text
Article -
346
Higher education for sustainable development in the digital era: Mapping the bibliometric analysis
Published 2024-11-01“…The study concluded that future publications in the analyzed field would cover the effectiveness of digital technologies in higher education, the development of competencies for the digital economy, inclusiveness, cybersecurity, as well as ethical aspects of the use of technologies to achieve the global sustainable development goals. …”
Get full text
Article -
347
Convolutional Attention Based Mechanism for Facial Microexpression Recognition
Published 2025-01-01Get full text
Article -
348
Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities
Published 2025-02-01“…However, it has additionally made cloud and IoT frameworks vulnerable to cyberattacks, production cybersecurity major concerns, mainly for the growth of trustworthy IoT networks, particularly those empowering smart city systems. …”
Get full text
Article -
349
Foundations of radar synthesis theory of phantom objects formation in SAR images
Published 2024-11-01Get full text
Article -
350
Challenges and Technology Trends in Implementing a Human Resource Management System: A Systematic Literature Review
Published 2024-10-01“…The potential opportunities from technology trends to address the issues included training and skills development, enhanced cybersecurity, and effective change management methods. …”
Get full text
Article -
351
Explainable artificial intelligence in web phishing classification on secure IoT with cloud-based cyber-physical systems
Published 2025-01-01“…The internet plays a prominent role in modern lives, and the cybersecurity challenge caused by phishing attacks is significant. …”
Get full text
Article -
352
-
353
Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning
Published 2025-01-01“…In cybersecurity, identifying and addressing vulnerabilities in source code is essential for maintaining secure IT environments. …”
Get full text
Article -
354
Challenges and Opportunities for Data Sharing Related to Artificial Intelligence Tools in Health Care in Low- and Middle-Income Countries: Systematic Review and Case Study From Tha...
Published 2025-02-01“…In Thailand, inconsistent data systems, limited staff time, low health data literacy, complex and unclear policies, and cybersecurity issues were important data-sharing challenges. …”
Get full text
Article -
355
-
356
Digital technologies for water use and management in agriculture: Recent applications and future outlook
Published 2025-03-01“…The study concludes by suggesting priorities for future research and development, highlighting the need for integrated technological solutions, improved accessibility and affordability, improved efficiency and sustainability, improved water quality, enhanced data management capabilities, and strategies to address emerging concerns such as cybersecurity and the environmental impact of digital technologies themselves. …”
Get full text
Article -
357
-
358
Navigating Ethical Dilemmas Of Generative AI In Medical Writing
Published 2024-10-01“…While this feature serves to improve the performance of these tools according to user input and requirements, it also fuels the debate about privacy breaches and cybersecurity issues that could arise if malicious forces override these tools.6 Although ChatGPT has allowed users to turn off their chat history and prevent the bot from storing their data as of April 2023, the extent to which AI-driven tools uphold the pledge of privacy and confidentiality of user data is not quite transparent. …”
Get full text
Article