-
501
Bearing Defect Detection with Unsupervised Neural Networks
Published 2021-01-01Get full text
Article -
502
-
503
An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems
Published 2024-06-01“…The main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information security. The original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI mechanisms. …”
Get full text
Article -
504
Using Blockchain in the Registration and Authentication of a Carpooling Application: From Review to Proposal
Published 2025-01-01“…This proposed research explores the benefits of improving the authentication processes for passengers and drivers within a shared transportation system to minimize information security risks. A thorough literature review was conducted on shared transportation, user registration, authentication processes within these systems, and technologies that could enhance security, such as blockchain. …”
Get full text
Article -
505
Patterned Lead‐Free Double Perovskite/Polymer Fluorescent Piezoelectric Composite Films for Advanced Anti‐Counterfeiting
Published 2025-01-01“…A multifunctional anti‐counterfeiting device has been further developed by integrating patterned optical and electrical responses onto flexible CFs, achieving synergistic protection of information security in cross fields and bringing a significant advancement to the high‐level anti‐counterfeiting market.…”
Get full text
Article -
506
Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection
Published 2021-02-01“…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. Intrusion detection is the process of monitoring traffic on a network to detect any data patterns that are considered suspicious, which allows network attacks. …”
Get full text
Article -
507
Laryngeal cancer diagnosis based on improved YOLOv8 algorithm
Published 2025-01-01Get full text
Article -
508
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Published 2024-05-01“…Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. …”
Get full text
Article -
509
Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB
Published 2022-12-01“…Dengan melakukan serangan menggunakan Autopsy dan Stegspy hanya 3 dari 30 stego image yang dapat dideteksi citra sharesnya, ini baru sebatas citra shares, dan untuk merekonstruksi ulang citra secretnya dibutuhkan sepasang shares, jadi diambil kesimpulan bahwa penggabungan metode ini berhasil mengamankan informasi didalamnya. Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. …”
Get full text
Article -
510
Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions
Published 2025-01-01“…The categorization of smart grid cyberattacks, while taking into account key information security characteristics, can help make it possible to provide organized and effective solutions for the present and potential attacks in smart grid applications. …”
Get full text
Article -
511
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025-01-01“…The proposed model includes state-of-the-art machine learning with traditional information security paradigms to offer an integrated solution to the emerging complex security issues related to 5G. …”
Get full text
Article -
512
-
513
DEVELOPING INFORMATION AND TECHNOLOGICAL COMPETENCE OF PROSPECTIVE MILITARY SAILORS
Published 2024-06-01“…Among these components are the skills of searching, storing, processing and transmitting information; ability to work with high-tech devices; knowledge of the basics of information security and data protection; the ability to monitor technological innovations in professional competences, etc. …”
Get full text
Article -
514
Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB
Published 2022-02-01“…Abstract Data and information security are currently an important aspect in the process of exchanging messages through the internet network. …”
Get full text
Article -
515
Designing a cyber insurance implementation model using foundational data theory
Published 2024-05-01“…Furthermore, the emergence of various softwares, the risk of information theft in cyberspace, intrusion into individual lives and sometimes government systems has increased, and such a situation has jeopardized information security (Kshetri et al, 2020). Until now, in Iran, specific and comprehensive coverage for cyber risk has not been provided, and the main reasons for not providing it by insurance companies can be attributed to the lack of information and technical knowledge in the field of providing the plan, the lack of knowledge of these organizations about this type of insurance coverage, and also, lack of sufficient financial transparency on the part of companies applying for such insurance policies. …”
Get full text
Article -
516
A Model for Bank Management Performance Appraisal with the Advanced Technologies Approach (Meta-Synthesis Method)
Published 2024-12-01“…These emerging dynamic technologies are dangerous even if they have positive effects on financial institutions and bank managers cannot protect their information assets against any attack on information security (Okoht , 2020).Case studyAssessing the performance of managers in branches of melli Bank of Sistan and Baluchistan province.Materials and MethodsWe have great development in this space using IR 0. 4 as setting new records or applying for personal credits in advanced banks enables buyers to do banking operations using available strategic tools. …”
Get full text
Article -
517
Investigating and prioritizing the factors affecting the success of e-commerce using the best and worst (BWM) technique.
Published 2024-05-01“…Effective factors include the components of 1- infrastructure (access to the Internet network, electronic storage of information, security systems and electronic payments), 2- payment system (payment authorization, various customer payment methods, settlement operations), 3- Knowledge and awareness (customer notification system, customer privacy consideration, company's response to customers' frequent questions), 4- Customer satisfaction (variety of products and advertisements, company's seasonal auctions, timely delivery of goods, building trust). …”
Get full text
Article -
518
Survey on trusted cloud platform technology
Published 2019-02-01“…Information security technology confronts severe challenges because of the safety demands of cloud computing.The trustworthiness and self-safety of cloud computing platform are the foundation of cloud computing security.The confidence of cloud users is the key issue the deep development and popularization for cloud computing.The trusted cloud computing technology provides a feasible solution.From the standpoint of guaranteeing the trustworthiness of cloud computing platform,related research progresses on trusted virtualization,construction of trusted cloud platform and trusted virtual machine were introduced.Additionally,the characteristics,application scopes and effectiveness of typical schemes were analyzed and compared.Finally,current limitations and possible directions for future research were discussed.…”
Get full text
Article -
519
Analysis of cyberspace security based on game theory
Published 2015-12-01“…Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and defense,cryptographic protocol design,and security technology con-figuration.The conflicts between attackers and defenders as well as the dependence among defenders were mainly analyzed on network and defense.Game theory’s applications in secret sharing and secure multi-party computation were emphasized on cryptographic protocol design.The game theory’s applications in intrusion detection system and firewall technology were analyzed on security technology configuration.Finally,the limitations of current re-searches and carries on the forecast to the future research directions were pointed out.…”
Get full text
Article -
520
Research on safety supervision data sharing of railway construction projects based on edge computing
Published 2020-06-01“…Information security monitoring system is widely used in railway construction projects,but the existing safety supervision model has problems such as high server load,heavy network bandwidth pressure,monitoring data can’t be effectively shared,key monitoring data may be tampered,and security accident responsibility is difficult to determine.A credible sharing model of safety supervision data for railway construction projects based on edge computing was proposed.On one hand,the construction of a safety monitoring edge computing framework for construction projects was constructed,and the data processing flow of edge nodes was described; on the other hand,a trusted data sharing framework based on blockchain was established,and a safety supervision data sharing process was designed and trusted sharing data was implemented through smart contracts.The proposed solution combined with edge computing and blockchain technology,which not only could strengthen the safety supervision of railway construction projects by industry authorities,but also provide new opportunities for stakeholders to share safety monitoring data in real time.…”
Get full text
Article