-
301
APPLICATION OF ARTIFICIAL INTELLIGENCE FOR IMPROVING SITUATIONAL TRAINING OF CYBERSECURITY SPECIALISTS
Published 2023-10-01“…The analysis conducted in this work allowed us to conclude the need for improvement of the situational teaching method as one of the main ways to develop the competencies of students majoring in Cybersecurity and Information Security in higher education institutions. One of the ways to improve the method is to use artificial intelligence tools in creating various types of tasks for classes. …”
Get full text
Article -
302
Long-Term Monitoring of Individuals With Chronic Obstructive Pulmonary Disease Using Digital Health Technology: Qualitative Study
Published 2025-02-01“…By addressing identified barriers and capitalizing on facilitators, advancements can be made in the development and use of DHT, especially in overcoming challenges such as information security and operational methods. The implementation of the recommended strategies will likely lead to improved COPD care outcomes.…”
Get full text
Article -
303
Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method
Published 2022-01-01“…However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. …”
Get full text
Article -
304
Efficient Implementation of Mahalanobis Distance on Ferroelectric FinFET Crossbar for Outlier Detection
Published 2024-01-01“…Mahalanobis distance, the multivariate equivalent of the Euclidean distance, is used to detect the outliers in the correlated data accurately and finds widespread application in fault identification, data clustering, singleclass classification, information security, data mining, etc. However, traditional CMOS-based approaches to compute Mahalanobis distance are bulky and consume a huge amount of energy. …”
Get full text
Article -
305
Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work
Published 2025-02-01Get full text
Article -
306
Intelligent Ensemble Deep Learning System for Blood Glucose Prediction Using Genetic Algorithms
Published 2022-01-01Get full text
Article -
307
Formation of Russian magistracy: implementation of the digital economy requests in the educational process
Published 2020-02-01“…As the main results, information on the use of modern educational technologies in the preparation of Russian undergraduates has been given – a conclusion has been made about the small distribution of on-line education and network programs in universities.The research data characterizing the degree of digital competencies of Russian graduate students have been adduced: information search and processing, use of IT technologies, information security, ability to work with «big» data. It has been noted, that these skills are well developed among modern students, but the participation of universities in their development is low. …”
Get full text
Article -
308
Modern trends and conceptual approaches to understanding the essence of the concept of “national security”
Published 2022-12-01“…More specific varieties of the legal definition of “security”, which correlate with it as “general” and “special” categories, are the concepts of “national security”, “state security”, “public security”, “personal security”, and derivatives from them, such as “military security”, “economic security”, “information security” and other types of security, are allocated in a separate type in numerous scientific works of Ukrainian and foreign specialists depending on the object of protection, the sphere of social relations, and the types of practical activities of various state bodies. …”
Get full text
Article -
309
-
310
Implementasi Teknologi Blockchain dengan Sistem Smart Contract pada Klaim Asuransi
Published 2024-10-01“…With these problems can cause problems related to information security in the form of data integrity, data confidentiality, and data transparency on insurance claims. …”
Get full text
Article -
311
Generic, specific and direct object of a crime under the Article 330 of the Criminal Code of Ukraine
Published 2018-12-01“…Accordingly, the specific object of this crime is more narrow range of specific social relations that are associated with ensuring the state of information security. It was formulated as social relations that exist with regard to the security of state secrets and official information gathered in the process of operative and search, counter-intelligence activities, in the field of the country defense. …”
Get full text
Article -
312
Bearing Defect Detection with Unsupervised Neural Networks
Published 2021-01-01Get full text
Article -
313
-
314
An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems
Published 2024-06-01“…The main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information security. The original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI mechanisms. …”
Get full text
Article -
315
Using Blockchain in the Registration and Authentication of a Carpooling Application: From Review to Proposal
Published 2025-01-01“…This proposed research explores the benefits of improving the authentication processes for passengers and drivers within a shared transportation system to minimize information security risks. A thorough literature review was conducted on shared transportation, user registration, authentication processes within these systems, and technologies that could enhance security, such as blockchain. …”
Get full text
Article -
316
Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection
Published 2021-02-01“…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. Intrusion detection is the process of monitoring traffic on a network to detect any data patterns that are considered suspicious, which allows network attacks. …”
Get full text
Article -
317
Laryngeal cancer diagnosis based on improved YOLOv8 algorithm
Published 2025-01-01Get full text
Article -
318
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Published 2024-05-01“…Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. …”
Get full text
Article -
319
Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB
Published 2022-12-01“…Dengan melakukan serangan menggunakan Autopsy dan Stegspy hanya 3 dari 30 stego image yang dapat dideteksi citra sharesnya, ini baru sebatas citra shares, dan untuk merekonstruksi ulang citra secretnya dibutuhkan sepasang shares, jadi diambil kesimpulan bahwa penggabungan metode ini berhasil mengamankan informasi didalamnya. Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. …”
Get full text
Article -
320
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025-01-01“…The proposed model includes state-of-the-art machine learning with traditional information security paradigms to offer an integrated solution to the emerging complex security issues related to 5G. …”
Get full text
Article