Results 31 to 40 of about 31,297 (287)

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

CYBER-ATTACK IN ESTONIA: A NEW CHALLENGE IN THE APPLICABILITY OF INTERNATIONAL HUMANITARIAN LAW

open access: yesYustisia, 2021
This article aimed to analyze the classification of armed conflict in Estonia's cyber-attack and how the existing IHL are answering this problem, and whether those regulations are enough for future cases of cyber-attack.
Iradhati Zahra   +2 more
doaj   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Applying the Full Protection and Security Standard of International Investment Law to Digital Assets [PDF]

open access: yes, 2011
This article considers the possibility that digital assets of foreign investors such as websites and computer systems could be protected by the full protection and security (‘FPS’) standard common to many bilateral investment treaties.
Collins, D. A.
core   +1 more source

Physical indicators of cyber attacks against a rescue robot [PDF]

open access: yes, 2014
Responding to an emergency situation is a challenging and time critical procedure. The primary goal is to save lives and this is directly related to the speed and efficiency at which help is provided to the victims.
Filippoupolitis, Avgoustinos   +3 more
core   +1 more source

Risk assessment method of security and stability control system considering the impact of cyber attacks

open access: yes电力工程技术, 2022
The security and stability control system is an important defense line to ensure the reliable operation of the power grid. Serious physical consequences can be caused by cyber attacks against the security and stability control system.
QIAN Sheng   +4 more
doaj   +1 more source

A Cyber Security Approach Using Multilayer Cryptographic System

open access: yesProceedings of the International Conference on Applied Innovations in IT
The cybersecurity is one of the important challenges facing the digital world to protect data over the Internet, where encryption technologies are used for this purpose.
Kamaran Adil Ibrahim   +4 more
doaj   +1 more source

Camp2Vec: Embedding cyber campaign with ATT&CK framework for attack group analysis

open access: yesICT Express, 2023
As the cyberattack subject has expanded from individual to group, attack patterns have become a complicated form of cyber campaigns. Although detecting the attack groups that operated the cyber campaigns is an important issue, complex methods such as ...
Insup Lee, Changhee Choi
doaj   +1 more source

Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

open access: yesEnergies, 2018
Hybrid AC/HVDC (AC-HVDC) grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication ...
Rui Fan   +3 more
doaj   +1 more source

A cyber‐attack detection method for load control system based on cyber and physical layer crosscheck mechanism

open access: yesIET Generation, Transmission & Distribution, 2022
Cyber‐attack has become one of the main threats to the safe operation of the load control system in the distribution network. Currently, a large number of methods are developed to detect cyber‐attacks.
Yingjun Wu   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy