Showing 1,961 - 1,980 results of 2,784 for search '((((( usedds OR useddds) OR useddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.19s Refine Results
  1. 1961

    Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review by Jones Márcio Nambundo, Otávio de Souza Martins Gomes, Adler Diniz de Souza, Raphael Carlos Santos Machado

    Published 2025-03-01
    “…These gaps include design requirements, software and firmware updates, physical security, the use of big data to detect vulnerabilities, user data privacy, and inconsistencies in machine learning algorithms. …”
    Get full text
    Article
  2. 1962

    SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare by Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Hafida Saidi, Joel Herve Mboussam Emati, Leandros Maglaras

    Published 2024-12-01
    “…Our research aims to improve data privacy and reduce communication costs. Furthermore, we also address weaknesses in decentralized learning systems, like Sybil and Model Poisoning attacks. …”
    Get full text
    Article
  3. 1963

    Human-machine in the vortex of digital synergy by Vaclav Moravec, Beata Gavurova, Nik Hynek, Martin Rigelsky

    Published 2025-05-01
    “…Using data from 1232 respondents (aged 15+), collected via a quota-based online survey from April 8 to April 26, 2024, logistic regression analyses investigated two key questions: (1) Does increased use of virtual assistants correlate with a higher likelihood of ChatGPT adoption? …”
    Get full text
    Article
  4. 1964

    Federated Learning for Decentralized DDoS Attack Detection in IoT Networks by Yaser Alhasawi, Salem Alghamdi

    Published 2024-01-01
    “…Our approach prioritizes data privacy by processing data locally, thereby avoiding the need for central data collection, while enhancing detection efficiency. …”
    Get full text
    Article
  5. 1965

    Deep learning in the fog by Andrzej Sobecki, Julian Szymański, David Gil, Higinio Mora

    Published 2019-08-01
    “…Processing all the data in the cloud may not be sufficient in cases when we need privacy and low latency, and when we have limited Internet bandwidth, or it is simply too expensive. …”
    Get full text
    Article
  6. 1966

    Mathematical Modeling of Multiattack Behavior Discrimination in the WSN Based on Incidence Matrix by Yu Shuai-Jing, Wang Peng-Fei

    Published 2022-01-01
    “…The WSN node model is used to collect relevant data and mark and map the disguised data, so as to determine the characteristics of multiattack behavior and establish the WSN multiattack behavior discrimination model based on the incidence matrix. …”
    Get full text
    Article
  7. 1967

    Studies on Artificial Intelligence’s Effect on the Employment Market in the Future by Chen Enqi

    Published 2024-01-01
    “…At the same time, the application of AI also raises concerns about privacy, data security, and ethical issues, all of which need to be considered in the development of the job market. …”
    Get full text
    Article
  8. 1968

    Understanding customer loyalty in digital services: insights from food delivery in emerging markets by Bora Ly

    Published 2025-07-01
    “…Trustworthiness has emerged as particularly influential due to concerns over data privacy, while service quality and convenience are crucial in shaping user satisfaction and loyalty.…”
    Get full text
    Article
  9. 1969

    A Novel Raster Map Exchange Scheme Based on Visual Cryptography by Lijing Ren

    Published 2021-01-01
    “…Raster map is an image that has been discretized in space and brightness, and it is an important carrier of geospatial data. With the rapid development of Internet and big data technologies, preserving the privacy of raster map has become an urgent task. …”
    Get full text
    Article
  10. 1970

    Assessing user preferences and competitive strategies of Gojek and Grab in ASEAN’s ride-hailing market by Pandu Kurniawan, Didi Achjari

    Published 2024-12-01
    “…This study aims to determine the criteria, sub-criteria, and alternatives influencing users in choosing ride-hailing and map Gojek and Grab’s grand strategy to compete in the ASEAN market, especially in Indonesia, Thailand, Vietnam, and Singapore. This research uses a questionnaire to collect data, with 377 Gojek and Grab users as participants. …”
    Get full text
    Article
  11. 1971

    Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks by Daemin Shin, Vishal Sharma, Jiyoon Kim, Soonhyun Kwon, Ilsun You

    Published 2017-01-01
    “…The proposed protocol includes steps for secure RO and handover management, where mutual authentication, key exchange, perfect forward secrecy, and privacy are supported. The correctness of the proposed protocol is formally analyzed using BAN-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). …”
    Get full text
    Article
  12. 1972

    Antecedents of trust in online environment: A case of Pakistan by Yaser Zaman, Raja Ahmed Jamil, Zain Kazmi

    Published 2016-03-01
    “…SPSS was used to analyze the data and three techniques descriptive statistics, regression analysis and correlation analysis are applied. …”
    Get full text
    Article
  13. 1973

    Vision-Based Activity Recognition for Unobtrusive Monitoring of the Elderly in Care Settings by Rahmat Ullah, Ikram Asghar, Saeed Akbar, Gareth Evans, Justus Vermaak, Abdulaziz Alblwi, Amna Bamaqa

    Published 2025-05-01
    “…The system integrates a frame differencing algorithm with adjustable sensitivity parameters and an anomaly detection model tailored to identify deviations from individual behavior patterns without relying on large volumes of labeled data. The system was validated through real-world deployments across multiple care home rooms, demonstrating significant improvements in emergency response times and ensuring resident privacy through anonymized frame differencing views. …”
    Get full text
    Article
  14. 1974

    A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption by Yuzhou Xi, Yu Ning, Jie Jin, Fei Yu

    Published 2024-12-01
    “…Cryptography ensures secure communication and data privacy, and it has been increasingly applied in healthcare and related areas. …”
    Get full text
    Article
  15. 1975

    Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection by Peng Luo, Rangjia Cai, Yuanbo Guo

    Published 2025-01-01
    “…The widespread use of the internet has led to frequent cryptographic attack event incidents, which pose various risks, including the leakage of personal information, privacy data, identity theft, and potential legal liabilities. …”
    Get full text
    Article
  16. 1976
  17. 1977

    Entrepreneurial strategies for sustainable growth: a deep dive into cloud-native technology and its applications by T. A. Alka, Aswathy Sreenivasan, M. Suresh

    Published 2025-02-01
    “…The policymaker's and enterprises' focus and actionable intervention are necessary for developing mechanisms to solve the barriers of regulatory compliance, lack of skilled manpower, data security, privacy issues, and upfront investment for entrepreneurial success.…”
    Get full text
    Article
  18. 1978

    eHealth Technology: What Do We Know and What do We Need to Learn by Ramzi A. Haraty, Ola A Sukkarieh

    Published 2021-06-01
    “…<p>eHealth is the use of information and communication technologies for health. eHealth serves multiple utilization purposes for storage, exchange, and retrieval of digital data for administrative, clinical, educational and research purposes. …”
    Get full text
    Article
  19. 1979

    A lightweight authentication and key agreement scheme for smart grid by Lili Yan, Yan Chang, Shibin Zhang

    Published 2017-02-01
    “…The security of advanced metering infrastructure is special importance for smart grid. In order to achieve data confidentiality, privacy, and authentication in advanced metering infrastructure, a lightweight authentication and key agreement scheme is proposed in this article. …”
    Get full text
    Article
  20. 1980

    Federated Learning for Predicting Major Postoperative Complications by Yuanfang Ren, PhD, Yonggi Park, PhD, Benjamin Shickel, PhD, Ziyuan Guan, MS, Ayush Patel, Yingbo Ma, PhD, Zhenhong Hu, PhD, Jeremy A. Balch, MD, Tyler J. Loftus, MD, PhD, Parisa Rashidi, PhD, Tezcan Ozrazgat-Baslanti, PhD, Azra Bihorac, MD, MS

    Published 2025-06-01
    “…To develop a robust model to accurately predict the risk of postoperative complications using clinical data from multiple institutions while ensuring data privacy. …”
    Get full text
    Article