Topic Review
Artificial Intelligence Techniques in Surveillance Video Anomaly Detection
The Surveillance Video Anomaly Detection (SVAD) system is a sophisticated technology designed to detect unusual or suspicious behavior in video surveillance footage without human intervention. The system operates by analyzing the video frames and identifying deviations from normal patterns of movement or activity. This is achieved through advanced algorithms and machine learning techniques that can detect and analyze the position of pixels in the video frame at the time of an event.
  • 775
  • 10 May 2023
Topic Review
Automatic Barrier Coverage in Smart City
Barrier coverage is a fundamental application in wireless sensor networks, which are widely used for smart cities. In applications, the sensors form a barrier for the intruders and protect an area through intrusion detection.
  • 173
  • 23 Nov 2023
Topic Review
Biometric Systems De-Identification
Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is presented. The article provides a rich avenue for subsequent explorations of biometric de-identification in the context of information privacy.
  • 636
  • 19 Oct 2021
Topic Review
Blockchain and Access Control for Internet of Things
The Internet of Things (IoT) has recently attracted much interest from researchers due to its diverse IoT applications. However, IoT systems encounter additional security and privacy threats. Developing an efficient IoT system is challenging because of its sophisticated network topology. Effective access control is required to ensure user privacy in the Internet of Things. Traditional access control methods are inappropriate for IoT systems because most conventional access control approaches are designed for centralized systems. 
  • 92
  • 22 Dec 2023
Topic Review
Blockchain enabled Virtualized Cloud Security Solutions
Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models.
  • 954
  • 22 Oct 2021
Topic Review
Blockchain Networks Privacy
One of the most widely researched areas in the field of blockchain networks is the domain of preserving blockchain privacy. The reason being the growing concern of several industries and business enterprises to protect their data and trade secrets from unauthorized access. 
  • 685
  • 03 Aug 2021
Topic Review
Blockchain-Assisted Cybersecurity for the Internet of Medical Things
The Internet of Medical Things (IoMT) plays an important role in strengthening sustainable healthcare systems. IoMT significantly influences our healthcare because it facilitates monitoring and checking patient medical information before transferring the data to a cloud network for future use. The IoMT is a big-data platform which is growing rapidly, so it is critical to maintain all data safely and securely.
  • 200
  • 01 Nov 2023
Topic Review
Blockchain-Based Authentication Framework for Secure IoT Networks
Most current research on decentralized IoT applications focuses on a specific vulnerability. However, for IoT applications, only a limited number of techniques are dedicated to handling privacy and trust concerns. To address that, blockchain-based solutions that improve the quality of IoT networks are becoming increasingly used. In the context of IoT security, a blockchain-based authentication framework could be used to store and verify the identities of devices in a decentralized manner, allowing them to communicate with each other and with external systems in a secure and trust-less manner.
  • 201
  • 25 Sep 2023
Topic Review
Cognitive Sciences in Cybersecurity
Cognitive security is the interception between cognitive science and artificial intelligence techniques used to protect institutions against cyberattacks. much attention has been paid to proactive cybersecurity solutions, acceptable cybersecurity practices, and cybersecurity hygiene strategies for mitigating cyberattacks. In this context, the use of cognitive science techniques has grown significantly. In general, cognitive science is being used to understand the behavior of adversaries to minimize the impact of cyberattacks.
  • 765
  • 04 Jul 2022
Topic Review
Context-Based and Adaptive Cybersecurity Risk Management Framework
Organizations are faced with a variety of cyber-threats and are possibly challenged by a wide range of cyber-attacks of varying frequency, complexity, and impact. However, they can do something to prevent, or at least mitigate, these cyber-attacks by first understanding and addressing their common problems regarding cybersecurity culture, developing a cyber-risk management plan, and devising a more proactive and collaborative approach that is suitable according to their organization context.
  • 545
  • 09 Jun 2023
  • Page
  • of
  • 10