Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
use » used (Expand Search)
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
uses » useds (Expand Search), used (Expand Search)
use » used (Expand Search)
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
uses » useds (Expand Search), used (Expand Search)
-
481
Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems
Published 2024-10-01“…This framework combines state-of-the-art machine learning and deep learning models, which are used in both centralized and federated learning configurations, to boost the detection of false data injection attacks in cyber-physical power systems. …”
Get full text
Article -
482
GraphFedAI framework for DDoS attack detection in IoT systems using federated learning and graph based artificial intelligence
Published 2025-08-01“…Abstract The Internet of Things (IoT) consists of physical objects and devices embedded with network connectivity, software, and sensors to collect and transmit data. The development of the Internet of Things (IoT) has led to various security and privacy issues, including distributed denial-of-service (DDoS) attacks. …”
Get full text
Article -
483
Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption
Published 2025-06-01“…Homomorphic Encryption (HE) introduces new dimensions of security and privacy within federated learning (FL) and internet of things (IoT) frameworks that allow preservation of user privacy when handling data for FL occurring in Smart Grid (SG) technologies. …”
Get full text
Article -
484
Fused federated learning framework for secure and decentralized patient monitoring in healthcare 5.0 using IoMT
Published 2025-07-01“…Abstract Federated Learning (FL) enables artificial intelligence frameworks to train on private information without compromising privacy, which is especially useful in the medical and healthcare industries where the knowledge or data at hand is never enough. …”
Get full text
Article -
485
Scalable architecture for autonomous malware detection and defense in software-defined networks using federated learning approaches
Published 2025-08-01“…This architecture combines SDN’s centralized management of potentially significant data streams with FL’s decentralized, privacy-preserving learning capabilities in a distributed manner adaptable to varying time and space constraints. …”
Get full text
Article -
486
-
487
Legal grounds for police officers' body-worn cameras
Published 2025-01-01“…The use of these cameras is based on legal provisions which authorize police officers to record their actions, collect and process personal data. …”
Get full text
Article -
488
-
489
Social Implications of Technological Advancements in Sentiment Analysis: A Literature Review on Potential and Consequences over the Next 20 Years
Published 2025-02-01“…It enables more responsive policy design by understanding public emotions in political and social contexts. However, data privacy, misinformation, and diminished critical thinking persist. …”
Get full text
Article -
490
Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection
Published 2025-01-01“…This study examines privacy calculus in online child sexual abuse material (CSAM) detection across Europe, using Flash Eurobarometer 532 data. …”
Get full text
Article -
491
COVID-19 Tracing Apps as a Legal Problem: An Investigation of the Norwegian ‘Smittestopp’ App
Published 2021-12-01“…This raises ethical and legal questions, as these apps have the potential to be used for surveillance of the population. There is pressure to set privacy and data protection aside to allow extensive collection and processing of personal data, while the benefits of the apps remain uncertain. …”
Get full text
Article -
492
Older people and the smart city – Developing inclusive practices to protect and serve a vulnerable population
Published 2023-03-01“…Using examples from three European locations – Helsinki, Flanders and Santander – we describe and discuss how we can gather personal data related to the daily lives of older people in terms of the existing privacy and data protection laws in the EU. …”
Get full text
Article -
493
-
494
Public Perceptions of Ethical Challenges and Opportunities for Enterprises in the Digital Age
Published 2025-06-01“…Statistical analysis demonstrated positive and significant associations: Data privacy and ethical prioritisation (t-value = 45, p < 0.001), Algorithmic ethics and ethical prioritisation (B = 0.35, p = 0.004), Factor analysis identified three critical variables: data privacy and security, ethical algorithms and workforce displacement accounted for 75% of the variance on average. …”
Get full text
Article -
495
Social Media Suicide Watch
Published 2025-07-01“…There was an immediate backlash due to concerns over privacy and the potential for stalkers and bullies to misuse this data and encourage suicide or self-harm, like Roy’s girlfriend did. …”
Get full text
Article -
496
An Exact Top- Query Algorithm with Privacy Protection in Wireless Sensor Networks
Published 2014-02-01“…Aimed at the Top- k query problems in the wireless sensor networks (WSN) where enquirers try to seek the k highest or shortest reported values of the source nodes, using privacy protection technology, we present an exact Top- k query algorithm based on filter and data distribution table (shorted for ETQFD). …”
Get full text
Article -
497
Redefining customer connections in the UAE’s digital era: A study on emerging technological synergies
Published 2025-06-01“…This study investigates the socio-technical implications of IoT integration, particularly its effects on operational efficiency, customer engagement, digital inclusivity, ethical data practices, and sustainability. The research used a quantitative cross-sectional survey conducted from February to April 2024 across the UAE. …”
Get full text
Article -
498
Democratic Oversight of Government Hacking by Intelligence Agencies
Published 2025-06-01Get full text
Article -
499
Optimization of machine learning methods for de-anonymization in social networks
Published 2025-03-01“…Anonymity features are widely used to help individuals maintain their privacy, but they can also be exploited for malicious purposes. …”
Get full text
Article -
500
Artificial Intelligence-Driven Facial Image Analysis for the Early Detection of Rare Diseases: Legal, Ethical, Forensic, and Cybersecurity Considerations
Published 2024-06-01“…Current and future developments must focus on securing AI models against attacks, ensuring data integrity, and safeguarding the privacy of individuals within this technological landscape.…”
Get full text
Article