Results 51 to 60 of about 7,255 (230)
Abstract Transfusion medicine generates enormous volumes of data across the vein‐to‐vein continuum, spanning donor characteristics, laboratory testing, component manufacturing, logistics and recipient outcomes. The emergence of big data infrastructures, coupled with artificial intelligence (AI), offers a transformative opportunity to harness this ...
Sheharyar Raza +6 more
wiley +1 more source
Phishing is basically stealing users personal information (e.g. stealing credit card information or using users banking passwords without any information to the user). Phishing can also be done by making fake web pages as similar as the real, legitimate page and when the user fills information asked in those web pages, they become victim of phishers ...
Aniket Nayakawadi +2 more
openaire +1 more source
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source
ABSTRACT As digitalization accelerates across the global economy, small and medium enterprises (SMEs) face increasing exposure to cybersecurity threats, not due to flaws in external platforms, but because of internal organizational vulnerabilities. This paper presents a conceptual framework that integrates the resource‐based view (RBV) and dynamic ...
Ifedapo Francis Awolowo +4 more
wiley +1 more source
With the rise in cybercrime, phishing remains a significant concern as it targets individuals with fake websites, causing victims to disclose their private information.
Ganesh S. Nayak +2 more
doaj +1 more source
Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs) [PDF]
The emergence of online services in our daily lives has been accompanied by a range of malicious attempts to trick individuals into performing undesired actions, often to the benefit of the adversary. The most popular medium of these attempts is phishing attacks, particularly through emails and websites.
Halgas, L, Agrafiotis, I, Nurse, J
openaire +2 more sources
Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance
ABSTRACT The rapid expansion of artificial intelligence (AI) in digital platforms used by youth has created significant challenges related to privacy, autonomy, and data protection. While AI‐driven personalization offers enhanced user experiences, it often operates without clear ethical boundaries, leaving young digital users vulnerable to data ...
Austin Shouli +3 more
wiley +1 more source
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
In recent years, phishing attacks have gotten more complicated and harder to detect. Technology-based preventative approaches have become utterly ineffective.
Ratna Yudhiyati +2 more
doaj +1 more source
Phishing continues to be one of the most prevalent and damaging forms of cybercrime, exploiting social engineering techniques to deceive users into divulging sensitive information such as login credentials, banking details, and personal data. Traditional defenses such as spam filters, antivirus software, and employee awareness campaigns have proven ...
null Hemant Shankar Junghare +3 more
openaire +1 more source

