Results 21 to 30 of about 10,182 (242)

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Co-design com Prática Sustentável no Ensino de Design de Moda

open access: yesRevista de Ensino em Artes, Moda e Design, 2020
A questão da sustentabilidade é apresentada hoje como um dos principais desafios da sociedade hipermoderna. Designers de moda e educadores têm a oportunidade de adotar um paradigma de design de moda, que se afasta das estruturas clássicas da
Desamparados Pardo Cuenca
doaj   +1 more source

Ethical Hacking and Hacking Attacks

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT, 2022
In today’s world information is available online to a large number of users who access information many times in a day . Information can be used in both good and bad ways (like destroying or stealing the data of websites or databases without the knowledge of their owner/ hacking someone’s account without their knowledge / Stealing bank account ...
openaire   +2 more sources

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Ofuscación. Tácticas de resistencia frente al capitalismo de vigilancia

open access: yesRevista Teknokultura, 2022
Aunque la vigilancia masiva no es algo exclusivo de Internet, actualmente el nivel de recopilación de datos que realizan las agencias gubernamentales y las corporaciones nos interpela a diversos niveles.
Fátima Solera Navarro
doaj   +1 more source

Empowering and conquering infirmity of visually impaired using AI‐technology equipped with object detection and real‐time voice feedback system in healthcare application

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract The Internet of Things is emerging as a crucial technology in aiding humans and making their lives easier. Among the human population, a large percentage of people suffer from disabilities resulting in challenges in everyday life particularly people with visual disabilities.
Hania Tarik   +8 more
wiley   +1 more source

Ethical Hacking and Hacking Attacks

open access: yesInternational Journal Of Engineering And Computer Science, 2017
As nowadays all the information is available online, a large number of users are accessing it, some of them use this information for gaining knowledge and some use it to know how to use this information to destroy or steal the data of websites or databases without the knowledge of the owner. The purpose of this paper is to tell what is hacking, who are
Aman Gupta, Abhineet Anand
openaire   +1 more source

Legal governance countermeasures for social problems based on the clustering algorithm under the application of big data technology

open access: yesIET Networks, EarlyView., 2022
This work aims to improve the comprehensive role of big data technology in promoting social development and reduce the continuous emergence of social problems under the background of big data application. Abstract The purpose is to improve the security of the application of big data technology and ensure the stable development of society in the context
Xuejie Zhao
wiley   +1 more source

Enhancing Cybersecurity in Energy IT Infrastructure Through a Layered Defense Approach to Major Malware Threats

open access: yesApplied Sciences
This study examines the cybersecurity vulnerabilities of energy IT infrastructure in the context of rapid digital transformation and network expansion.
Dojin Ryu   +5 more
doaj   +1 more source

Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite

open access: yesMedia and Communication, 2021
In the digital age, the crisis of journalism has been exacerbated by antagonistic actors infiltrating the journalistic system without adhering to its norms or logic.
Gerret von Nordheim   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy