Results 41 to 50 of about 233,719 (314)

Ofuscación. Tácticas de resistencia frente al capitalismo de vigilancia

open access: yesRevista Teknokultura, 2022
Aunque la vigilancia masiva no es algo exclusivo de Internet, actualmente el nivel de recopilación de datos que realizan las agencias gubernamentales y las corporaciones nos interpela a diversos niveles.
Fátima Solera Navarro
doaj   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Less-conventional low-consumption galvanic separated MOSFET-IGBT gate drive supply [PDF]

open access: yes, 2017
A simple half-bridge, galvanic separated power supply which can be short circuit proof is proposed for gate driver local supplies. The supply is made while hacking a common mode type filter as a transformer, as the transformer shows a good insulation, it
Bikorimana, Jean Marie Vianney   +1 more
core   +3 more sources

Ethical Hacking and Hacking Attacks

open access: yesInternational Journal Of Engineering And Computer Science, 2017
As nowadays all the information is available online, a large number of users are accessing it, some of them use this information for gaining knowledge and some use it to know how to use this information to destroy or steal the data of websites or databases without the knowledge of the owner. The purpose of this paper is to tell what is hacking, who are
Aman Gupta, Abhineet Anand
openaire   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Enhancing Cybersecurity in Energy IT Infrastructure Through a Layered Defense Approach to Major Malware Threats

open access: yesApplied Sciences
This study examines the cybersecurity vulnerabilities of energy IT infrastructure in the context of rapid digital transformation and network expansion.
Dojin Ryu   +5 more
doaj   +1 more source

Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite

open access: yesMedia and Communication, 2021
In the digital age, the crisis of journalism has been exacerbated by antagonistic actors infiltrating the journalistic system without adhering to its norms or logic.
Gerret von Nordheim   +1 more
doaj   +1 more source

Empowering and conquering infirmity of visually impaired using AI‐technology equipped with object detection and real‐time voice feedback system in healthcare application

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract The Internet of Things is emerging as a crucial technology in aiding humans and making their lives easier. Among the human population, a large percentage of people suffer from disabilities resulting in challenges in everyday life particularly people with visual disabilities.
Hania Tarik   +8 more
wiley   +1 more source

A Study on a Scenario-Based Security Incident Prediction System for Cybersecurity

open access: yesApplied Sciences
In the 4th industrial era, the proliferation of interconnected smart devices and advancements in AI, particularly big data and machine learning, have integrated various industrial domains into cyberspace.
Yong-Joon Lee
doaj   +1 more source

Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography

open access: yesComputers, 2023
Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer of ...
Noura A. Mawla, Hussein K. Khafaji
doaj   +1 more source

Home - About - Disclaimer - Privacy