Results 111 to 120 of about 278,396 (266)

A New Image Encryption Method Using an Optimized Smart Codebook

open access: yesHuman Behavior and Emerging Technologies
Information attacks have increased worldwide as more information is available in digital form. Image encryption is essential to prevent attackers from unauthorized access to confidential images. In this paper, we introduce a novel image encryption method
Rami Sihwail, Dyala Ibrahim
doaj   +1 more source

LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution. [PDF]

open access: yesSensors (Basel), 2023
Bouzidi M   +4 more
europepmc   +1 more source

Visioning ecologically diverse and harmonious futures of Korea in Good Anthropocene

open access: yesPeople and Nature, EarlyView.
Abstract The Korean Demilitarized Zone (DMZ), a buffer between North and South Korea, holds profound historical, cultural and ecological significance, as well as exceptional potential for conservation and transformation. This study explores ecologically diverse and peaceful futures for the Korean Peninsula by envisioning the DMZ as a landscape for ...
HyeJin Kim   +24 more
wiley   +1 more source

iCNN-LSTM+: A Batch-Based Incremental Ransomware Detection System Using Sysmon

open access: yesIEEE Access
Ransomware remains a persistent and evolving cyber threat, requiring adaptive and efficient detection mechanisms. This study presents a novel CNN-LSTM-based detection system that leverages Sysmon logs for real-time analysis on Windows endpoints.
Jamil Ispahany   +3 more
doaj   +1 more source

Life after herbarium digitisation: Physical and digital collections, curation and use

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton   +39 more
wiley   +1 more source

Cyber security threats: A never-ending challenge for e-commerce. [PDF]

open access: yesFront Psychol, 2022
Liu X   +6 more
europepmc   +1 more source

The Challenge of Ensuring Business Security in Information Age [PDF]

open access: yes
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU   +2 more
core  

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

The Integration of AI, Blockchain and IoT for the Sustainable Development of the Logistics Service Industry: Insights From a PRISMA‐Based Analysis

open access: yesSustainable Development, EarlyView.
ABSTRACT This study presents an analysis of the literature on artificial intelligence (AI), blockchain and internet of things (IoT) for the sustainable development of the service industry of freight transport and logistics service providers (LSPs).
Roberto Cerchione   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy