You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Counterfeit Attack Modes in Microelectronics
As the global supply chain grows more intricate and the prevalence of counterfeit components surges, it becomes paramount to verify the authenticity of electrical chips. The infiltration of counterfeit components, potentially finding their way into electronic equipment, raises concerns as workers contend with mounting client demands. Microelectronics are vital to the healthcare and defense industries, making them vulnerable to counterfeit products.
  • 862
  • 15 Nov 2023
Topic Review
Prospects of Cybersecurity in Smart Cities
Smart cities are urban spaces characterized by the widespread use of Information and Communication Technologies (ICTs). They intend to improve political-economic efficiency and support human and social development, thus improving the quality of life of its citizens. Cybersecurity plays a key role in smart cities due to the increasing interconnectivity and widespread use of ICT.
  • 840
  • 01 Sep 2023
Topic Review
Secure Internet of Things Based on Blockchain
Centralized networks can host ubiquitous interconnected objects using Internet of Things (IoT) platforms. It is also possible to implement decentralized peer-to-peer solutions using blockchain technology, including smart homes and connected cars. However, both models have limitations regarding their ability to provide privacy and security due to limited resources, centralization management, and scalability, cost, and response time. The diversity of IoT network nodes is expected to result in different throughputs and rates. Centralized networks control and improve the performance of a large number of IoT devices. However, centralizing systems suffer from a number of disadvantages. A third party often has to manipulate the data collected by central cloud storage, which could lead to information leaks that could compromise the user’s privacy.
  • 834
  • 27 Oct 2023
Topic Review
Intrusion Detection in IoT Networks
The Internet of Things (IoT) is expanding rapidly and is becoming increasingly crucial to how we live our daily lives. Internet protocol addresses can be used by IoT nodes for connecting to the Internet. Intrusion detection systems (IDSs) guarantee both the security posture and defense against intrusions of IoT devices.
  • 829
  • 03 Nov 2023
Topic Review
Blockchain-Based Authentication Framework for Secure IoT Networks
Most current research on decentralized IoT applications focuses on a specific vulnerability. However, for IoT applications, only a limited number of techniques are dedicated to handling privacy and trust concerns. To address that, blockchain-based solutions that improve the quality of IoT networks are becoming increasingly used. In the context of IoT security, a blockchain-based authentication framework could be used to store and verify the identities of devices in a decentralized manner, allowing them to communicate with each other and with external systems in a secure and trust-less manner.
  • 814
  • 25 Sep 2023
Topic Review
AI-Based Resource Allocation Techniques in Wireless Sensor IoT
A wireless sensor network (WSN) is a network of several sensor nodes that are typically put in remote places to monitor environmental characteristics. The IoT (Internet of Things)-based restricted WSN has sparked a lot of attention and progress in order to attain improved resource utilisation as well as service delivery. For data transfer between heterogeneous devices, IoT requires a stronger communication network and an ideally placed energy-efficient WSN.
  • 810
  • 18 Jul 2022
Topic Review
Social Behavioral Biometrics
Social Behavioral Biometrics (SBB) is a novel biometric category. This innovative field of study investigates a person’s social interactions and communication patterns to ascertain their identity. 
  • 802
  • 12 Oct 2023
Topic Review
A Lightweight Double-Stage Scheme to Identify Malicious DNS
The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused.
  • 790
  • 04 Dec 2023
Topic Review
AraMAMS Restaurants Reviews Corpus for Aspect-Based Sentiment Analysis
AraMA comprises 10,750 Google Maps reviews for restaurants in Riyadh, Saudi Arabia. It covers four aspect categories—food, environment, service, and price—along with four sentiment polarities: positive, negative, neutral, and conflict. All AraMA reviews are labeled with at least two aspect categories. A second version, named AraMAMS, includes reviews labeled with at least two different sentiments, making it the first Arabic multi-aspect, multi-sentiment dataset. Aspect-based sentiment analysis (ABSA) is a field of SA that goes one step further than SA by automatically assigning sentiments to certain features or aspects in the text.
  • 783
  • 21 Aug 2023
Topic Review
Enhancing Ransomware Attack Detection on Cloud-Encrypted Data
Ransomware attacks on cloud-encrypted data pose a significant risk to the security and privacy of cloud-based businesses and their consumers. RANSOMNET+, a state-of-the-art hybrid model that combines Convolutional Neural Networks (CNNs) with pre-trained transformers, to efficiently take on the challenging issue of ransomware attack classification. RANSOMNET+ excels over other models because it combines the greatest features of both architectures, allowing it to capture hierarchical features and local patterns. The findings demonstrate the exceptional capabilities of RANSOMNET+. The model had a fantastic precision of 99.5%, recall of 98.5%, and F1 score of 97.64%, and attained a training accuracy of 99.6% and a testing accuracy of 99.1%. The loss values for RANSOMNET+ were impressively low, ranging from 0.0003 to 0.0035 throughout training and testing. RANSOMNET+ excelled over the other two models in terms of F1 score, accuracy, precision, and recall. The algorithm’s decision-making process was also illuminated by RANSOMNET+’s interpretability analysis and graphical representations. The model’s openness and usefulness were improved by the incorporation of feature distributions, outlier detection, and feature importance analysis. Finally, RANSOMNET+ is a huge improvement in cloud safety and ransomware research. As a result of its unrivaled accuracy and resilience, it provides a formidable line of defense against ransomware attacks on cloud-encrypted data, keeping sensitive information secure and ensuring the reliability of cloud-stored data. Cybersecurity professionals and cloud service providers now have a reliable tool to combat ransomware threats thanks to this research.
  • 783
  • 11 Dec 2023
Topic Review
Zero-Day Attack and Cybersecurity on Twitter
In the information era, knowledge can pose risks in the online realm. It is imperative to proactively recognize potential threats, as unforeseen dangers cannot be eliminated entirely. Often, malware exploits and other emerging hazards are only identified after they have occurred. These types of risks are referred to as zero-day attacks since no pre-existing anti-malware measures are available to mitigate them. Consequently, significant damages occur when vulnerabilities in systems are exploited. The effectiveness of security systems, such as IPS and IDS, relies heavily on the prompt and efficient response to emerging threats.
  • 781
  • 05 Sep 2023
Topic Review
Privacy and Security of Blockchain in Healthcare
Blockchain offers a cutting-edge solution for storing medical data, carrying out medical transactions, and establishing trust for medical data integration and exchange in a decentralized open healthcare network setting. While blockchain in healthcare has garnered considerable attention, privacy and security concerns remain at the center of the debate when adopting blockchain for information exchange in healthcare.
  • 769
  • 13 Nov 2023
Topic Review
Cyber-Physical Power System
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS). Network attack, in addition to faults, becomes an important factor restricting the stable operation of the power system.
  • 756
  • 28 Feb 2023
Topic Review
Optimizing Cybersecurity Attack Detection in Computer Networks
In computer network security, the escalating use of computer networks and the corresponding increase in cyberattacks have propelled Intrusion Detection Systems (IDSs) to the forefront of research in computer science. IDSs are a crucial security technology that diligently monitor network traffic and host activities to identify unauthorized or malicious behavior.
  • 754
  • 02 Feb 2024
Topic Review
Data Analysis Using Machine Learning for Cybersecurity
The internet has become an indispensable tool for organizations, permeating every facet of their operations. Virtually all companies leverage Internet services for diverse purposes, including the digital storage of data in databases and cloud platforms. Furthermore, the rising demand for software and applications has led to a widespread shift toward computer-based activities within the corporate landscape. However, this digital transformation has exposed the information technology (IT) infrastructures of these organizations to a heightened risk of cyber-attacks, endangering sensitive data. Consequently, organizations must identify and address vulnerabilities within their systems, with a primary focus on scrutinizing customer-facing websites and applications. 
  • 748
  • 15 Dec 2023
Topic Review
FamilyGuard
The residential environment is constantly evolving technologically. With this evolution, sensors have become intelligent interconnecting home appliances, personal computers, and mobile devices. Despite the benefits of this interaction, these devices are also prone to security threats and vulnerabilities. Ensuring the security of smart homes is challenging due to the heterogeneity of applications and protocols involved in this environment. This entry proposes the FamilyGuard architecture to add a new layer of security and simplify management of the home environment by detecting network traffic anomalies.
  • 745
  • 02 May 2023
Topic Review
Generative Adversarial Network for Wireless Physical Layer Authentication
Wireless physical layer authentication has emerged as a promising approach to wireless security. The topic of wireless node classification and recognition has experienced significant advancements due to the rapid development of deep learning techniques. Ubiquitous technologies are experiencing significant growth, characterized by the development of several innovative systems, including smart vehicles, smart homes, smart cities and intelligent applications in industries and healthcare. 
  • 715
  • 24 Jan 2024
Topic Review
Threshold-Optimized Depth-Based Routing Protocol
The exponentially growing concern of cyber-attacks on extremely dense underwater sensor networks (UWSNs) and the evolution of UWSNs digital threat landscape has brought novel research challenges and issues. 
  • 689
  • 29 Jan 2024
Topic Review
Fog Computing in IoT Environments
Large amounts of data are created from sensors in Internet of Things (IoT) services and applications. These data create a challenge in directing these data to the cloud, which needs extreme network bandwidth. Fog computing appears as a modern solution to overcome these challenges, where it can expand the cloud computing model to the boundary of the network, consequently adding a new class of services and applications with high-speed responses compared to the cloud.
  • 689
  • 09 Jan 2024
Topic Review
P4-HLDMC
Distributed Denial of Service (DDoS) and Address Resolution Protocol (ARP) attacks pose significant threats to the security of Software-Defined Internet of Things (SD-IoT) networks. The standard Software-Defined Networking (SDN) architecture faces challenges in effectively detecting, preventing, and mitigating these attacks due to its centralized control and limited intelligence.
  • 684
  • 01 Sep 2023
  • Page
  • of
  • 5
Academic Video Service