Results 101 to 110 of about 51,742 (230)

An Explainable and Carbon‐Aware Stacked Ensemble Model for Phishing and Impersonation Detection in Online Social Networks

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
EcoSecure‐Phish is an explainable, energy‐aware ensemble framework for detecting phishing and impersonation in online social networks. By integrating optimized boosting models with feature selection and sustainability metrics, it achieves high detection accuracy while reducing latency, energy consumption, and carbon impact for scalable, real‐time ...
Romil Rawat   +5 more
wiley   +1 more source

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

The Criminal Offense of Credit/Debit Card Fraud and the Implementation of Its Sanction on Indonesian Criminal Law

open access: yesHasanuddin Law Review, 2015
The aims of the study are to determine the legal arrangements and the application of criminal sanctions against the crime of credit/debit card fraud in Indonesia.
Antonius Maria Laot Kian
doaj  

Enhancing Cloud‐Based Healthcare Security With Quantum‐Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework

open access: yesHealth Science Reports, Volume 9, Issue 5, May 2026.
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose   +6 more
wiley   +1 more source

INTEGRATIVE APPROACH TO THE ANALYSIS, MODELING, AND ENSURING CYBER SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE UNDER MODERN THREATS

open access: yesBaltic Journal of Economic Studies
The present study explores contemporary approaches to the analysis, modelling and assurance of cyber security of critical information infrastructure in the face of modern threats.
Valentyna Yashchuk   +2 more
doaj   +1 more source

Contemporary Trends in Economic Cybersecurity

open access: yesМир новой экономики, 2019
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dynamics of cyber-attacks over the past five years and, particularly, pointed on the main trends of 2018 year.
Yu. Yu. Shitova, Yu. A. Shitov
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e [PDF]

open access: yes, 2013
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no ...
Citron, Danielle Keats   +2 more
core   +1 more source

Data mining for detecting Bitcoin Ponzi schemes

open access: yes, 2018
Soon after its introduction in 2009, Bitcoin has been adopted by cyber-criminals, which rely on its pseudonymity to implement virtually untraceable scams. One of the typical scams that operate on Bitcoin are the so-called Ponzi schemes.
Bartoletti, Massimo   +2 more
core   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy