Results 111 to 120 of about 278,396 (266)
A New Image Encryption Method Using an Optimized Smart Codebook
Information attacks have increased worldwide as more information is available in digital form. Image encryption is essential to prevent attackers from unauthorized access to confidential images. In this paper, we introduce a novel image encryption method
Rami Sihwail, Dyala Ibrahim
doaj +1 more source
LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution. [PDF]
Bouzidi M +4 more
europepmc +1 more source
Visioning ecologically diverse and harmonious futures of Korea in Good Anthropocene
Abstract The Korean Demilitarized Zone (DMZ), a buffer between North and South Korea, holds profound historical, cultural and ecological significance, as well as exceptional potential for conservation and transformation. This study explores ecologically diverse and peaceful futures for the Korean Peninsula by envisioning the DMZ as a landscape for ...
HyeJin Kim +24 more
wiley +1 more source
iCNN-LSTM+: A Batch-Based Incremental Ransomware Detection System Using Sysmon
Ransomware remains a persistent and evolving cyber threat, requiring adaptive and efficient detection mechanisms. This study presents a novel CNN-LSTM-based detection system that leverages Sysmon logs for real-time analysis on Windows endpoints.
Jamil Ispahany +3 more
doaj +1 more source
Life after herbarium digitisation: Physical and digital collections, curation and use
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton +39 more
wiley +1 more source
Cyber security threats: A never-ending challenge for e-commerce. [PDF]
Liu X +6 more
europepmc +1 more source
The Challenge of Ensuring Business Security in Information Age [PDF]
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU +2 more
core
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
ABSTRACT This study presents an analysis of the literature on artificial intelligence (AI), blockchain and internet of things (IoT) for the sustainable development of the service industry of freight transport and logistics service providers (LSPs).
Roberto Cerchione +2 more
wiley +1 more source
Preschool Cyber Security Management System Based on Intelligent Agents. [PDF]
Song J.
europepmc +1 more source

