Results 21 to 30 of about 10,182 (242)
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Co-design com Prática Sustentável no Ensino de Design de Moda
A questão da sustentabilidade é apresentada hoje como um dos principais desafios da sociedade hipermoderna. Designers de moda e educadores têm a oportunidade de adotar um paradigma de design de moda, que se afasta das estruturas clássicas da
Desamparados Pardo Cuenca
doaj +1 more source
Ethical Hacking and Hacking Attacks
In today’s world information is available online to a large number of users who access information many times in a day . Information can be used in both good and bad ways (like destroying or stealing the data of websites or databases without the knowledge of their owner/ hacking someone’s account without their knowledge / Stealing bank account ...
openaire +2 more sources
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
Ofuscación. Tácticas de resistencia frente al capitalismo de vigilancia
Aunque la vigilancia masiva no es algo exclusivo de Internet, actualmente el nivel de recopilación de datos que realizan las agencias gubernamentales y las corporaciones nos interpela a diversos niveles.
Fátima Solera Navarro
doaj +1 more source
Abstract The Internet of Things is emerging as a crucial technology in aiding humans and making their lives easier. Among the human population, a large percentage of people suffer from disabilities resulting in challenges in everyday life particularly people with visual disabilities.
Hania Tarik +8 more
wiley +1 more source
Ethical Hacking and Hacking Attacks
As nowadays all the information is available online, a large number of users are accessing it, some of them use this information for gaining knowledge and some use it to know how to use this information to destroy or steal the data of websites or databases without the knowledge of the owner. The purpose of this paper is to tell what is hacking, who are
Aman Gupta, Abhineet Anand
openaire +1 more source
This work aims to improve the comprehensive role of big data technology in promoting social development and reduce the continuous emergence of social problems under the background of big data application. Abstract The purpose is to improve the security of the application of big data technology and ensure the stable development of society in the context
Xuejie Zhao
wiley +1 more source
This study examines the cybersecurity vulnerabilities of energy IT infrastructure in the context of rapid digital transformation and network expansion.
Dojin Ryu +5 more
doaj +1 more source
In the digital age, the crisis of journalism has been exacerbated by antagonistic actors infiltrating the journalistic system without adhering to its norms or logic.
Gerret von Nordheim +1 more
doaj +1 more source

