Results 41 to 50 of about 233,719 (314)
Ofuscación. Tácticas de resistencia frente al capitalismo de vigilancia
Aunque la vigilancia masiva no es algo exclusivo de Internet, actualmente el nivel de recopilación de datos que realizan las agencias gubernamentales y las corporaciones nos interpela a diversos niveles.
Fátima Solera Navarro
doaj +1 more source
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Less-conventional low-consumption galvanic separated MOSFET-IGBT gate drive supply [PDF]
A simple half-bridge, galvanic separated power supply which can be short circuit proof is proposed for gate driver local supplies. The supply is made while hacking a common mode type filter as a transformer, as the transformer shows a good insulation, it
Bikorimana, Jean Marie Vianney +1 more
core +3 more sources
Ethical Hacking and Hacking Attacks
As nowadays all the information is available online, a large number of users are accessing it, some of them use this information for gaining knowledge and some use it to know how to use this information to destroy or steal the data of websites or databases without the knowledge of the owner. The purpose of this paper is to tell what is hacking, who are
Aman Gupta, Abhineet Anand
openaire +1 more source
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
This study examines the cybersecurity vulnerabilities of energy IT infrastructure in the context of rapid digital transformation and network expansion.
Dojin Ryu +5 more
doaj +1 more source
In the digital age, the crisis of journalism has been exacerbated by antagonistic actors infiltrating the journalistic system without adhering to its norms or logic.
Gerret von Nordheim +1 more
doaj +1 more source
Abstract The Internet of Things is emerging as a crucial technology in aiding humans and making their lives easier. Among the human population, a large percentage of people suffer from disabilities resulting in challenges in everyday life particularly people with visual disabilities.
Hania Tarik +8 more
wiley +1 more source
A Study on a Scenario-Based Security Incident Prediction System for Cybersecurity
In the 4th industrial era, the proliferation of interconnected smart devices and advancements in AI, particularly big data and machine learning, have integrated various industrial domains into cyberspace.
Yong-Joon Lee
doaj +1 more source
Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer of ...
Noura A. Mawla, Hussein K. Khafaji
doaj +1 more source

