Security Implications of AI Chatbots in Health Care
Artificial intelligence (AI) chatbots like ChatGPT and Google Bard are computer programs that use AI and natural language processing to understand customer questions and generate natural, fluid, dialogue-like responses to their inputs. ChatGPT,
Jingquan Li
doaj +2 more sources
The application of blockchain technology in data trading: a systematic review [PDF]
In the era of exponential data growth, the imperative to establish secure and efficient data trading mechanisms has become paramount. While traditional centralized architectures present critical limitations in security and operational efficiency, the ...
Wei Xiong, Huaibin Shao, Hong Ge
doaj +3 more sources
Integrating PCA and DEA techniques for strategic assessment of network security [PDF]
Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network.
Reza Rasinojehdehi, Seyyed Najafi
doaj +1 more source
A Logic for Constraint-based Security Protocol Analysis [PDF]
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties.
Corin, R.J., Etalle, S., Saptawijaya, A.
core +26 more sources
Voice Feature Extraction for Gender and Emotion Recognition [PDF]
Voice recognition plays a key function in spoken communication that facilitates identifying the emotions of a person that reflects within the voice. Gender classification through speech is a popular Human Computer Interaction (HCI) method on account that
Nashipudimath Madhu M. +4 more
doaj +1 more source
Fuzzy based intrusion detection system in MANET
The rapid development and popularization of the Mobile Adhoc Network (MANET) have brought many security issues in network. Intrusion detection system, an effective security technology which can efficiently detect malicious data in complex network ...
C. Edwin Singh, S. Maria Celestin Vigila
doaj +1 more source
Network intrusion detection using oversampling technique and machine learning algorithms [PDF]
The expeditious growth of the World Wide Web and the rampant flow of network traffic have resulted in a continuous increase of network security threats. Cyber attackers seek to exploit vulnerabilities in network architecture to steal valuable information
Hafiza Anisa Ahmed +2 more
doaj +2 more sources
A Method of Intrusion Detection Based on WOA-XGBoost Algorithm
With the development of information technology, computer networks have become a part of people’s lives and work. However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks ...
Yan Song, Haowei Li, Panfeng Xu, Dan Liu
doaj +1 more source
Evaluation of Medical Level in China by Provinces Based on Principal Component Analysis and TOPSIS Model [PDF]
Background During the nationwide epidemic of COVID-19 infection, the spatial agglomeration of medical resources in China has been highlighted, and there are obvious differences in medical level among provinces.
ZHOU Jie, HU Lingjuan, HUAI Qingyu
doaj +1 more source
A machine learning-based intrusion detection for detecting internet of things network attacks
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy and security risks—the ...
Yakub Kayode Saheed +4 more
doaj +1 more source

