Topic Review
Illegal IPTV Technologies
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from different sources. These infringing IPTV technologies may include websites, software, software add-ons, and physical set-top boxes. Due to the free or low cost of illegal IPTV technologies, illicit IPTV content providers will often resort to intrusive advertising, scams, and the distribution of malware to increase their revenue.
  • 328
  • 20 Oct 2023
Topic Review
Accessible Higher-Education: A Framework for Continuous Improvement
The SARS-CoV-2 Coronavirus pandemic (COVID-19) forced educational institutions to move their programs to the virtual world, revealing needs such as the lack of accessibility of online resources and content. In this context, the Erasmus+ project "Technological Assistance to Accessibility in Virtual Higher Education (EduTech)”, proposed tools and knowledge focused on improving accessibility in Higher Education Institutions (HEIs). In this article, a framework that integrates all the findings of the EduTech project is presented. The proposed framework is aimed at facilitating the adoption of good practices related to technological accessibility in HEI. The framework considers the limitations and needs of the institutions in terms of governance and resources for improving accessibility. The framework was adopted by four Latin American HEIs to establish a continuous improvement strategy according to their needs and current level of accessibility focus. This research also shows the results and suggests that the proposal is adaptable to the needs of HEIs, allowing its implementation regardless of their organizational structure and their current level of attention to accessibility.
  • 371
  • 16 Oct 2023
Topic Review
Quantum Machine Learning for Security Assessment in IoMT
Internet of Medical Things (IoMT) is an ecosystem composed of connected electronic items such as small sensors/actuators and other cyber-physical devices (CPDs) in medical services. When these devices are linked together, they can support patients through medical monitoring, analysis, and reporting in more autonomous and intelligent ways.
  • 270
  • 13 Oct 2023
Topic Review
Advanced Persistent Threats Detection for Mobile Devices
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-organized and skilled adversary to remain undetected while systematically and continuously exfiltrating sensitive data. Various APT attack vectors exist, including social engineering techniques such as spear phishing, watering holes, SQL injection, and application repackaging. Various sensors and services are essential for a smartphone to assist in user behavior that involves sensitive information. Resultantly, smartphones have become the main target of APT attacks.
  • 195
  • 12 Oct 2023
Topic Review
Driver Drowsiness Detection
Drowsy driving is a widespread cause of traffic accidents, especially on highways. It has become an essential task to seek an understanding of the situation in order to be able to take immediate remedial actions to detect driver drowsiness and enhance road safety.
  • 447
  • 25 Sep 2023
Topic Review
Keyword-Based Trust Management System for Fog Computing
Many companies have seen dramatic changes because of cloud computing. This is particularly true given the rapid increase in the use of enormous data sets. Meanwhile, there has been a meteoric increase in demand for private services. The proliferation of Internet of Things (IoT) devices and the increasing demand for low-latency applications have led to the rise of fog computing as a solution for decentralized data processing. Malicious nodes, unauthorized access, and data breaches can compromise the integrity and reliability of data processing. Therefore, there is a solid motivation to address these gaps in trust management and enhance the overall security of fog computing. Optimizing network performance and reducing latency is crucial to ensuring a seamless user experience in fog computing. Improving the efficiency of data transmission and communication among fog nodes can significantly enhance the performance of fog computing networks.
  • 180
  • 18 Aug 2023
Topic Review
Blockchain Technology and E-Government
The field of electronic government (e-government) is gaining prominence in contemporary society, as it has a significant influence on the wider populace within the context of a technologically advanced world. E-government makes use of information and communication technologies (ICTs) at various levels and domains within government agencies and the public sector. ICT reduces manual labour, potential fraud points, errors, and process lapses. The Internet’s quick accessibility and the widespread adoption of modern technologies and disciplines, such as big data, the Internet of Things, machine learning, and artificial intelligence, have accelerated the need for e-government.
  • 243
  • 07 Aug 2023
Topic Review
Illuminating Ecuador's Data Revolution
In the era of data-driven decision-making, Ecuador stands poised at the forefront of a transformative revolution, embracing data analysis to unveil the untapped potential of its knowledge landscape. This pioneering work delves into the depths of Ecuador's data ecosystem, exploring the vast applications and profound impact of data analysis on the nation's society, education, and industry.
  • 319
  • 03 Aug 2023
Topic Review
Feature Extracted Deep Neural Collaborative Filtering
The electronic publication market is growing along with the electronic commerce market. Electronic publishing companies use recommendation systems to increase sales to recommend various services to consumers. However, due to data sparsity, the recommendation systems have low accuracy. Also, previous deep neural collaborative filtering models utilize various variables of datasets such as user information, author information, and book information, and these models have the disadvantage of requiring significant computing resources and training time for their training.
  • 211
  • 27 Jul 2023
Topic Review
Efficient Fingerprinting Attack on Web Applications
Website fingerprinting is valuable for many security solutions as it provides insights into applications that are active on the network.
  • 235
  • 25 Jul 2023
  • Page
  • of
  • 94