Topic Review
In-Vehicle Intrusion Detection Systems
Breaches in the cyberspace due to cyber-physical attacks can harm the physical space, and any type of vehicle is an alluring target for wrongdoers for an assortment of reasons. Especially, as the automobiles are becoming increasingly interconnected within the Cooperative Intelligent Transport System (C-ITS) realm and their level of automation elevates, the risk for cyberattacks augments along with the attack surface, thus inexorably rendering the risk of complacency and inaction sizable. Next to other defensive measures, intrusion detection systems (IDS) already comprise an inextricable component of modern automobiles in charge of detecting intrusions in the system while in operation.
  • 1.9K
  • 07 May 2022
Topic Review
Ransomware-Resilient Self-Healing XML Documents
The cybersecurity threat would inherently cause substantial financial losses and time wastage for affected organizations and users. A great deal of research has taken place across academia and around the industry to combat this threat and mitigate its danger. These ongoing endeavors have resulted in several detection and prevention schemas.  The self-healing version-aware ransomware recovery (SH-VARR) framework for XML documents is based on the novel idea of using the link concept to maintain file versions in a distributed manner while applying access-control mechanisms to protect these versions from being encrypted or deleted.
  • 698
  • 07 May 2022
Topic Review
Cryptographic Electronic Voting
Electronic voting (e-voting) is an electronic system that allows users to make a collaborative decision or vote for candidates in an election. It handles the registration of voters, input of vote, vote casting, vote encryption, the transmission of the ballot to the server, vote storing, vote counting, and tabulation of the election result. 
  • 334
  • 06 May 2022
Topic Review
Abusive Domain Names by Internet Entities
A large number of domains are abused every day for cybercrime. At the same time, the fight against abusive domains is not the fight of one person or organization but a battle that requires the cooperation of the entire community.  A large number of domain names on the Internet are misused daily for cybercriminal activities, ranging from spoofing victims’ private information (phishing), to maliciously installing software onto end-users’ devices (malware attacks), to distributing illegal obscene videos. Internet abuse continues to victimize millions of people each year, reducing trust in the Internet as a place to conduct business and non-business activities. This decline in confidence has a detrimental effect on all stakeholders in the Internet ecosystem, from end-users to infrastructure service providers.
  • 1.2K
  • 06 May 2022
Topic Review
FabLab
The fast expansion of digital culture has fostered the creation of makerspaces such as fabrication laboratories (FabLabs) that, thanks to their flexibility and their use of open source tools, strengthen the sense of community and produce true transformations within those communities. Fabrication laboratories (FabLabs) are an integral part of “communities and spaces with more or less open to the public levels, with objectives and targets agreed by its members in which, through learning processes, production, prototyping, design, and manufacturing, both tangible and intangible assets, complex two-way exchanges of information are produced, knowledge, technology, skills and resources among users, users and society and between users and industry” that constitute the new wave of collaborative ecologies into which elements such as makerspaces, hackerspaces, living-labs or co-workings also fall, highlighted by its origin and its capacity as an international organization. A FabLab is a strong social space offering affordable and accessible manufactured tools and is sometimes conceived as an appropriate platform to begin the prototyping and development processes of any object. They emerged in the 2000s at the Massachusetts Institute of Technology (MIT) from Professor Neil Gershenfeld’s subject, called “How to Make (Almost) Anything”. Thanks to the creation of this first FabLab, Professor Gershenfeld’s students could realize their designs, popularizing digital manufacturing and making the subject successful.
  • 371
  • 06 May 2022
Topic Review
Artificial Intelligence Challenges
Artificial intelligence (AI) has been widely used in recent years. During analyses of the challenges of AI, numerous problems have been reported, some of which are security, safety, fairness, energy consumption, and ethics, to mention a few. The widespread usage of AI leads to arising new challenges.
  • 682
  • 05 May 2022
Topic Review
Autism with Optimized Machine Learning Models
Early diagnosis of autism is extremely beneficial for patients. Traditional diagnosis approaches have been unable to diagnose autism in a fast and accurate way; rather, there are multiple factors that can be related to identifying the autism disorder. The gene expression (GE) of individuals may be one of these factors, in addition to personal and behavioral characteristics (PBC). Machine learning (ML) based on PBC and GE data analytics emphasizes the need to develop accurate prediction models. The quality of prediction relies on the accuracy of the ML model. To improve the accuracy of prediction, optimized feature selection algorithms are applied to solve the high dimensionality problem of the datasets used. Comparing different optimized feature selection methods using bio-inspired algorithms over different types of data can allow for the most accurate model to be identified. 
  • 400
  • 05 May 2022
Topic Review
Information System for Security Auditing
Information security and cybersecurity management play a key role in modern enterprises. There is a plethora of standards, frameworks, and tools, ISO 27000 and the NIST Cybersecurity Framework being two relevant families of international Information Security Management Standards (ISMSs). Globally, these standards are implemented by dedicated tools to collect and further analyze the information security auditing that is carried out in an enterprise. The overall goal of the auditing is to evaluate and mitigate the information security risk. The risk assessment is grounded by auditing processes, which examine and assess a list of predefined controls in a wide variety of subjects regarding cybersecurity and information security. For each control, a checklist of actions is applied and a set of corrective measures is proposed, in order to mitigate the flaws and to increase the level of compliance with the standard being used. The auditing process can apply different ISMSs in the same time frame. However, as these processes are time-consuming, involve on-site interventions, and imply specialized consulting teams, the methodology usually adopted by enterprises consists of applying a single ISMS and its existing tools and frameworks. This strategy brings overall less flexibility and diversity to the auditing process and, consequently, to the assessment results of the audited enterprise.
  • 699
  • 05 May 2022
Topic Review
Technologies for Down Syndrome Persons
Since the beginning of the 21st century, the lifespan of people born with Down syndrome (DS) has increased. They now outlive their parents and rely on their relatives who usually sacrifice their own families to care for their disabled siblings. To reduce the pressure on families and the wider community, it is crucial to prepare DS people for independent life from early childhood. Emerging technologies can significantly support the process of acquiring the skills that are necessary for solving real-life problems at home and work.
  • 847
  • 05 May 2022
Topic Review
Roadside Unit Deployment in Internet of Vehicles Systems
The network technology known as Internet of Vehicles (IoV) has been developed to improve road safety and vehicle security, with the goal of servicing the digital demands of car drivers and passengers. The highly dynamical network topology that characterizes these networks, and which often leads to discontinuous transmissions, is one of the most significant challenges of IoV. To address this issue, IoV infrastructure-based components known as roadside units (RSU) are designed to play a critical role by providing continuous transmission coverage and permanent connectivity. The main challenges that arise when deploying RSUs are balancing IoVs’ performances and total cost so that optimal vehicle service coverage is provided with respect to some target Quality of Service (QoS) such as: service coverage, throughput, low latency, or energy consumption.
  • 3.4K
  • 05 May 2022
  • Page
  • of
  • 371
Video Production Service