Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
Submit
Entry
Video
Image
and
or
not
All
${ type }
To
Search
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Most Viewed
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Filter:
All
Topic Review
Biography
Peer Reviewed Entry
Video Entry
Topic Review
System Architecture for Autonomous Vehicles
Technology facilitates humans, improves productivity and leads to a better quality of life. Technological developments and automation in vehicular networks will lead to better road safety and lower congestion in present urban areas where the traditional transport system is becoming increasingly disorganised and inefficient. Therefore, the development of the intelligent transport systems (ITS) concept has been proposed, with the aim and focus on improving traffic safety and providing different services to its users. There has been considerable research in ITS resulting in significant contributions .
18.3K
07 Apr 2021
Topic Review
VANETs
A Vehicular Ad-hoc Network (VANET) comprises a group of moving or stationary vehicles connected by a wireless network. VANETs play a vital role in providing safety and comfort to drivers in vehicular environments. They provide smart traffic control and real-time information, event allocation.
11.1K
16 Apr 2021
Topic Review
Cybersecurity Economics
Cybersecurity economics can be defined as a field of research that utilizes a socio-technical perspective to investigate economic aspects of cybersecurity such as budgeting, information asymmetry, governance, and types of goods and services, to provide sustainable policy recommendations, regulatory options, and practical solutions that can substantially improve the cybersecurity posture of the interacting agents in the open socio-technical systems.
5.8K
15 Dec 2021
Topic Review
Cybersecurity Frameworks and Information Security Standards
Businesses are reliant on data to survive in the competitive market, and data is constantly in danger of loss or theft. Loss of valuable data leads to negative consequences for both individuals and organizations. Cybersecurity is the process of protecting sensitive data from damage or theft. To successfully achieve the objectives of implementing cybersecurity at different levels, a range of procedures and standards should be followed. Cybersecurity standards determine the requirements that an organization should follow to achieve cybersecurity objectives and facilitate against cybercrimes. Cybersecurity standards demonstrate whether an information system can meet security requirements through a range of best practices and procedures. A range of standards has been established by various organizations to be employed in information systems of different sizes and types.
2.3K
21 Jul 2022
Topic Review
Quantum Computing Supremacy in the Internet of Things
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing eliminates most of the challenges in IoT.
1.9K
16 Nov 2022
Topic Review
The Taxonomy of Malware Analysis and Detection Approaches
The evolution of recent malicious software with the rising use of digital services has increased the probability of corrupting data, stealing information, or other cybercrimes by malware attacks. Therefore, malicious software must be detected before it impacts a large number of computers. While malware analysis is taxonomy and linked to the data types that are used with each analysis approach, malware detection is introduced with a deep taxonomy where each known detection approach is presented in subcategories and the relationship between each introduced detection subcategory and the data types that are utilized is determined.
1.7K
14 Sep 2022
Topic Review
Drone Cyber Attack Detection through Machine Learning
A smart city comprises a number of integrated components that enable its functioning and rendering of automated services to its citizens. Data generated by smart city components is facilitated for transmission across the ICT network to the next hop devices of the communication network topology. Data collection on a large scale is referred to as data volume. Analytics of collected data is contingent on the level of urgency and the computational capabilities of the controllers, edge devices and the geographic proximity of these to the central cloud platform. For instance, IoT data obtained from curb-side sensors will have to be communicated to the next hop edge device, whereupon further data processing can take place in the cloud. Data volume at a large scale is constantly communicated from resource-constrained devices, including drones, to a central cloud, for processing and subsequent decision making. Artificial Intelligence (AI) plays a significant role in accurate decision making from collected data in a smart city platform.
1.3K
02 Aug 2022
Topic Review
Optical Components Used to Implement Optical Functions
Deep learning has an unquenchable thirst for processing resources. Classical deep learning has silently developed a bottleneck due to the interference of electrical impulses, energy usage, and physical constraints, even though electronic parts established on silicon can still sustain it presently. Academic and corporate circles are attempting to find new approaches for resolving electrical flaws that are less computationally intensive. It has huge benefits in information transmission and OC due to its high speed of 300,000 km per second, which is 300 times faster than that of an electron, and its data-carrying capacity and variety, which is 2 × 104 times greater than that of electric channels, as well as high parallelism and strong anti-interference. Switching electricity with light has emerged as a viable and sustainable work style, following the current trend.
1.2K
30 Jun 2022
Topic Review
Secure Cloud Infrastructure Review
Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost-effective manner. Security is the biggest concern for cloud computing and is a major obstacle to users adopting cloud computing systems. Maintaining the security of cloud computing is important, especially for the infrastructure.
1.2K
13 Oct 2021
Topic Review
6G Cellular Networks
There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will emerge as a continued evolution of the mobile network. Blockchain technology is one of the leading supporting technologies predicted to provide a secure and unique network to 6G-enabled devices, transactions, and applications. It is anticipated that the 6G mobile networks will be virtualized, have cloud-based systems, and aim to be the foundation for the Internet of Everything.
1.2K
13 Jun 2022
Topic Review
Cyber-Physical System
Cyber-Physical System (CPS) is a symbol of the fourth industrial revolution (4IR) by integrating physical and computational processes which can associate with humans in various ways. In short, the relationship between Cyber networks and the physical component is known as CPS, which is assisting to incorporate the world and influencing our ordinary life significantly. In terms of practical utilization of CPS interacting abundant difficulties. CPS is involved in modern society very vastly with many uptrend perspectives. All the new technologies by using CPS are accelerating our journey of innovation. Researchers have explained the research areas of 14 important domains of Cyber-Physical Systems (CPS) including aircraft transportation systems, battlefield surveillance, chemical production, energy, agriculture (food supply), healthcare, education, industrial automation, manufacturing, mobile devices, robotics, transportation, and vehicular.
1.2K
11 May 2023
Topic Review
Blockchain enabled Virtualized Cloud Security Solutions
Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models.
1.2K
22 Oct 2021
Topic Review
Internet of Things with the Industrial Marketplace
There is no doubt that new technology has become one of the crucial parts of most people’s lives around the world. By and large, in this era, the Internet and the Internet of Things (IoT) have become the most indispensable parts of our lives. Recently, IoT technologies have been regarded as the most broadly used tools among other technologies. The tools and the facilities of IoT technologies within the marketplace are part of Industry 4.0. The marketplace is too regarded as a new area that can be used with IoT technologies. One of the main purposes of this paper is to highlight using IoT technologies in Industry 4.0, and the Industrial Internet of Things (IIoT) is another feature revised.
1.1K
21 Feb 2022
Topic Review
Artificial Intelligence Techniques in Surveillance Video Anomaly Detection
The Surveillance Video Anomaly Detection (SVAD) system is a sophisticated technology designed to detect unusual or suspicious behavior in video surveillance footage without human intervention. The system operates by analyzing the video frames and identifying deviations from normal patterns of movement or activity. This is achieved through advanced algorithms and machine learning techniques that can detect and analyze the position of pixels in the video frame at the time of an event.
1.1K
10 May 2023
Topic Review
Cognitive Sciences in Cybersecurity
Cognitive security is the interception between cognitive science and artificial intelligence techniques used to protect institutions against cyberattacks. much attention has been paid to proactive cybersecurity solutions, acceptable cybersecurity practices, and cybersecurity hygiene strategies for mitigating cyberattacks. In this context, the use of cognitive science techniques has grown significantly. In general, cognitive science is being used to understand the behavior of adversaries to minimize the impact of cyberattacks.
1.1K
04 Jul 2022
Topic Review
Models for Evaluation Intrusion Detection Systems in IoT
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastructure from adversary activities. Several network systems suffer from drawbacks that allow intruders to use malicious traffic to obtain unauthorized access. Attacks such as Distributed Denial of Service attacks (DDoS), Denial of Service attacks (DoS), and Service Scans demand a unique automatic system capable of identifying traffic abnormality at the earliest stage to avoid system damage. Numerous automatic approaches can detect abnormal traffic. However, accuracy is not only the issue with current Intrusion Detection Systems (IDS), but the efficiency, flexibility, and scalability need to be enhanced to detect attack traffic from various IoT networks.
1.0K
27 May 2022
Topic Review
Evolution of Personal Data Store
The idea of the personal data store goes back to the early 2000s. The initial idea of this concept was to store and capture digital materials (e.g., books, photos, and other digital documents). This idea was developed for MyLifeBits as a platform to store scanned paper files and record, store, and access a personal lifetime archive. Personal web observatories are another concept based on the idea of Personal Data Stores (PDS). A personal web observatory is a technical platform that, first and foremost, enables individuals to consolidate and archive their data that is dispersed among multiple sources. Later, the concept of Personal Information Management (PIM) and Personal dataspace management was introduced to specifically focus on the process of managing personal digital information such as emails, images, HTML, XML, audio, video, and so on.
964
08 May 2023
Topic Review
Context-Based and Adaptive Cybersecurity Risk Management Framework
Organizations are faced with a variety of cyber-threats and are possibly challenged by a wide range of cyber-attacks of varying frequency, complexity, and impact. However, they can do something to prevent, or at least mitigate, these cyber-attacks by first understanding and addressing their common problems regarding cybersecurity culture, developing a cyber-risk management plan, and devising a more proactive and collaborative approach that is suitable according to their organization context.
945
09 Jun 2023
Topic Review
Model Predictive Traffic Control by Bi-Level Optimization
A bi-level model for traffic signal optimization is developed. The model predictive framework is applied for traffic control in an urban traffic network. The potential of the bi-level formalization is used to increase the space of control influences with simultaneous evaluation of the green light and cycle durations. Thus, the increased control space allows more traffic parameters to be considered, such as vehicles queues and traffic flows. A particular modification of the bi-level control is applied for the synchronization of the traffic lights in the network. The model predictive approach is used for the real-time management of the traffic in the network. The control implementations are constrained by the shortest evaluated cycle.
938
11 May 2022
Topic Review
Cybersecurity: A Historical Overview of Attacks
This research provides a comprehensive overview of the history of cybersecurity attacks and institutions working to fight them. It covers the early days of cyber attacks, the rise of hacking and cybercrime, notable cyber attacks such as Code Red, Stuxnet, Target, and WannaCry, and institutions fighting cyberattacks, including the National Security Agency, Federal Bureau of Investigation, Department of Homeland Security, and Cybersecurity and Infrastructure Security Agency. The research also discusses open challenges and future directions in the field, such as the need for new technologies and policies to combat increasingly complex cyber threats, and the importance of investing in cybersecurity education. This research aims to provide policymakers, researchers, and the general public with a better understanding of the history of cybersecurity and the ongoing efforts to promote a safer and more secure digital world.
936
22 May 2023
Page
of
5
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Social Sciences
Chief Editor:
Kum Fai Yuen
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Fungi
Chief Editor:
Luis V. Lopez-Llorca
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
ScholarVision Creations
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×