Results 31 to 40 of about 79,967 (299)
MobileTrust: Secure Knowledge Integration in VANETs [PDF]
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes.
Demetriou, G. +5 more
core +2 more sources
At the Group of Seven (G7) summit held on 13–15 June in 2024, the Group’s leaders committed to establishing a collective cyber security framework and reinforcing the work of the cyber security working group to manage the risks targeting energy systems ...
Megghi Pengili, Slawomir Raszewski
doaj +1 more source
Anthony Burke and Rita Parker: Global Insecurities: Futures of Global Chaos and Governance
This innovative volume gathers some of the world’s best scholars to analyse the world’s collective international efforts to address globalised threats through global security governance.
Zemanová, Michaela
doaj +5 more sources
Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things [PDF]
A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings. As intelligence is imported in embedded equipment, the system becomes able to provide smart services (e.g. control lights, airconditioning,
Alexandris, G. +6 more
core +1 more source
Higher learning institutions confront heightened cyber threats due to the value of their data, necessitating a robust security culture. In addition to cyber threats, various security incidents cause danger to devices and personal belongings on campuses ...
Thomas Mbonimpa +3 more
doaj +1 more source
Institutional Foundations for Cyber Security: Current Responses and New Challenges [PDF]
Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for almost everyone in the developed ...
Choucri, Nazli +2 more
core
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
Features requirement elicitation process for designing a chatbot application
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari +4 more
wiley +1 more source
In an increasingly interconnected digital world, cybersecurity has emerged as a crucial element of national resilience and global political competition.
Muhammad Prakoso Aji
doaj +1 more source
A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs [PDF]
Cyber security is one of the most significant technical challenges in current times. Detecting adversarial activities, prevention of theft of intellectual properties and customer data is a high priority for corporations and government agencies around the
Agarwal, Khushbu +4 more
core

