Topic Review
2020 Nintendo Data Leak
The 2020 Nintendo data leak, more commonly referred to as the Nintendo Gigaleak is a series of leaks of data from Japanese video game company Nintendo on the anonymous imageboard website 4chan. The releasing of data started in March 2018, but became most prominent in 2020. Nine main sets of data leaked on 4chan, ranging from game and console source code to internal documentation and development tools. The name "Gigaleak" mainly refers to the second leak on July 24, 2020, which was 3 gigabytes in size. The leaks are believed to have come either from companies contracted by Nintendo in the design of these consoles, or from individuals previously convicted of intrusion into Nintendo systems. An earlier, much smaller leak had also occurred in 2018 which had the Nintendo Space World 1997 demos for Pokémon Gold and Silver leaked. The leaks are infamous for the sheer size and the amount of internal material leaked; video game journalists have described the magnitude of the leaks as unprecedented, and suggested that they might have significant effects for emulation and to preservationists, in addition to the legal questions posed by the leak. As of May 2021, Nintendo has not made any official response.
  • 2.8K
  • 14 Oct 2022
Topic Review
5G Technology
In wireless communication, Fifth Generation (5G) Technology is a recent generation of mobile networks. Among all the previously existing mobile networks, 5G provides a high-speed internet facility, anytime, anywhere, for everyone. 5G is slightly different due to its novel features such as interconnecting people, controlling devices, objects, and machines. 5G mobile system will bring diverse levels of performance and capability, which will serve as new user experiences and connect new enterprises.
  • 1.3K
  • 16 Feb 2022
Topic Review
A Beginner's Python Tutorial
Python is an interpreted programming language.
  • 736
  • 04 Nov 2022
Topic Review
A Generative Adversarial Network Technique for Ransomware Behavior Prediction
The ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidly outdated attack patterns, despite efforts to focus on select features. Such an approach assumes that the same features remain unchanged. This approach proves ineffective due to the polymorphic and metamorphic characteristics of ransomware, which generate unique attack patterns for each new target, particularly in the pre-encryption phase where evasiveness is prioritized. 
  • 249
  • 30 Oct 2023
Topic Review
A Proactive Protection by Computational Intelligence Methods
A combination of computational intelligence methods: identifying anomalies in network traffic by evaluating its self-similarity, detecting and classifying cyberattacks in anomalies, and taking effective protection measures using Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) cells.
  • 320
  • 25 Oct 2022
Topic Review
A Smarter Health through Internet of Surgical Things
To systematically study the technological advances in a particular sector, attributed to the utilization of the Internet, the term “Internet of Things” (IoT) was introduced. The present systematic review, aims to present and analyze the modern applications of the IoT within the surgical world. While not strictly defined, IoT describes a network of Internet-based connected things equipped with (embedded) sensing and actuating devices, with data production, processing, and consumption abilities. The utilization of the Internet and IoT in medical practice can take many shapes and forms. Ranging from the awe-inspiring telesurgical procedures to complex AI machine learning applications that aid in medical decision making , to a simple email containing a preoperative CT scan, the Internet of Surgical Things (IoST) is here to stay. 
  • 1.0K
  • 04 Jul 2022
Topic Review
A Stakeholder-Specific View on Impact Sourcing
Impact Sourcing is the outsourcing of activities to disadvantaged social groups in order to help them become participants of the globalized digital world and thus benefit from higher incomes and wealth creation.
  • 437
  • 23 Nov 2022
Topic Review
A Systematic Approach to Healthcare Knowledge Management Systems
Big data in healthcare contain a huge amount of tacit knowledge that brings great value to healthcare activities such as diagnosis, decision support, and treatment. However, effectively exploring and exploiting knowledge on such big data sources exposes many challenges for both managers and technologists. A healthcare knowledge management system that ensures the systematic knowledge development process on various data in hospitals was proposed. It leverages big data technologies to capture, organize, transfer, and manage large volumes of medical knowledge, which cannot be handled with traditional data-processing technologies. In addition, machine-learning algorithms are used to derive knowledge at a higher level in supporting diagnosis and treatment.
  • 960
  • 13 May 2022
Topic Review
Abstract Syntax Notation One
Abstract Syntax Notation One (ASN.1) is a standard interface description language for defining data structures that can be serialized and deserialized in a cross-platform way. It is broadly used in telecommunications and computer networking, and especially in cryptography. Protocol developers define data structures in ASN.1 modules, which are generally a section of a broader standards document written in the ASN.1 language. The advantage is that the ASN.1 description of the data encoding is independent of a particular computer or programming language (other than ASN.1.) Because ASN.1 is both human-readable and machine-readable, an ASN.1 compiler can compile modules into libraries of code, CODECs, that decode or encode the data structures. Some ASN.1 compilers can produce code to encode or decode several encodings, e.g. packed, BER or XML. ASN.1 is a joint standard of the International Telecommunication Union Telecommunication Standardization Sector (ITU-T) and ISO/IEC, originally defined in 1984 as part of CCITT X.409:1984. In 1988, ASN.1 moved to its own standard, X.208, due to wide applicability. The substantially revised 1995 version is covered by the X.680 series. The latest revision of the X.680 series of recommendations is the 5.0 Edition, published in 2015.
  • 876
  • 04 Nov 2022
Topic Review
Abusive Domain Names by Internet Entities
A large number of domains are abused every day for cybercrime. At the same time, the fight against abusive domains is not the fight of one person or organization but a battle that requires the cooperation of the entire community.  A large number of domain names on the Internet are misused daily for cybercriminal activities, ranging from spoofing victims’ private information (phishing), to maliciously installing software onto end-users’ devices (malware attacks), to distributing illegal obscene videos. Internet abuse continues to victimize millions of people each year, reducing trust in the Internet as a place to conduct business and non-business activities. This decline in confidence has a detrimental effect on all stakeholders in the Internet ecosystem, from end-users to infrastructure service providers.
  • 1.0K
  • 06 May 2022
  • Page
  • of
  • 49