Results 271 to 280 of about 10,475,631 (365)
ABSTRACT The increasing complexity and frequency of cyberattacks present significant challenges to Intrusion Detection Systems (IDS), mainly unknown (zero‐day) attacks. IDS are essential for safeguarding networks, but traditional systems struggle to detect unknown threats in dynamic and evolving network environments due to their reliance on predefined ...
Daniel Mourão Martins+2 more
wiley +1 more source
Federated learning with enhanced cryptographic security for vehicular cyber-physical systems. [PDF]
Babbar H, Rani S, Shabaz M.
europepmc +1 more source
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Fast and flexible minimizer digestion with digest. [PDF]
Zheng A+4 more
europepmc +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee+4 more
wiley +1 more source
A Guide to Machine Learning Epistemic Ignorance, Hidden Paradoxes, and Other Tensions
ABSTRACT Machine learning (ML) has rapidly scaled in capacity and complexity, yet blind spots persist beneath its high performance façade. In order to shed more light on this argument, this paper presents a curated catalogue of 175 unconventional concepts, each capturing a paradox, tension, or overlooked risk in modern ML practice.
M. Z. Naser
wiley +1 more source
Blockchain-Based Information Security Protection Mechanism for the Traceability of Intellectual Property Transactions. [PDF]
Wang Z+5 more
europepmc +1 more source
Enhanced secure storage and data privacy management system for big data based on multilayer model. [PDF]
Ting T, Li M.
europepmc +1 more source
DeCoTa: a lightweight decentralized cross-chain transfer scheme based on hash-locking. [PDF]
Zou H, Sun H, Chen S, Ren W, Zheng X.
europepmc +1 more source