Results 51 to 60 of about 12,885 (184)
Blockchain technology has revolutionized numerous industries by providing decentralized, transparent, and immutable ledgers. However, its adoption is hindered by persistent security challenges, including arbitrage attacks, liquidity exploits, and noncompliance with antimoney laundering (AML) regulations.
Aleaddin Ozer +2 more
wiley +1 more source
KDPII: A New Korean Dialogic Dataset for the Deidentification of Personally Identifiable Information
The rapid growth of social media in the era of big data and artificial intelligence has raised significant safety concerns related to the communication of sensitive personal information.
Li Fei +5 more
doaj +1 more source
An effective privacy enhanced interface to support record linkage decisions
Introduction Privacy enhanced technologies (PET) are those that measure and protect privacy by preventing unnecessary use of personal data without loss of the functionality of the information system.
Hye-Chung Kum +4 more
doaj +1 more source
Linking very large, consented birth cohorts to birthing hospitals clinical data could elucidate the lifecourse outcomes of health care and exposures during the pregnancy, birth and newborn periods.
Yanhong Jessika Hu +9 more
doaj +1 more source
Abstract Machine learning (ML) and generative artificial intelligence (GAI) in recent years are rapidly revolutionizing the healthcare industry offering improved precision and efficiency of healthcare delivery. The use of these advanced technologies in healthcare such as medical imaging, drug discoveries, predictive analytics, and personalized medicine
Muhammad Umar +10 more
wiley +1 more source
Toward a Secure Future: An Integrated Framework for PII Detection Using NLP and Visual Analysis
Safeguarding Personally Identifiable Information (PII) is critical to prevent data breaches and identity theft in the era of digital services. This paper presents a hybrid PII detection and secure verification system that integrates rule-based regular ...
S. Sheela +3 more
doaj +1 more source
A combined Blockchain and zero-knowledge model for healthcare B2B and B2C data sharing
The two main forms of healthcare data exchange among entities are business-to-business (B2B) and business-to-customer (B2C). The former uses the electronic data interchange (EDI) technology between healthcare institutions, while the latter is usually ...
Hesham Moosa +4 more
doaj +1 more source
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin +2 more
wiley +1 more source
Text-based passwords serve as a primary means of authentication and play a crucial role in securing information systems. However, easy-to-remember passwords are often vulnerable to targeted password guessing attacks.
Wei Ou +5 more
doaj +1 more source
The datafication of student information on X (Twitter)
The sharing of personally identifiable information (PII) through social media platforms poses known risks to children's online privacy and safety. While the risks of oversharing PII through a range of digital contexts are becoming better understood ...
Cody Pritchard +4 more
doaj +1 more source

