Results 1 to 10 of about 158,862 (242)

Security Implications of AI Chatbots in Health Care

open access: yesJournal of Medical Internet Research, 2023
Artificial intelligence (AI) chatbots like ChatGPT and Google Bard are computer programs that use AI and natural language processing to understand customer questions and generate natural, fluid, dialogue-like responses to their inputs. ChatGPT,
Jingquan Li
doaj   +2 more sources

The application of blockchain technology in data trading: a systematic review [PDF]

open access: yesPeerJ Computer Science
In the era of exponential data growth, the imperative to establish secure and efficient data trading mechanisms has become paramount. While traditional centralized architectures present critical limitations in security and operational efficiency, the ...
Wei Xiong, Huaibin Shao, Hong Ge
doaj   +3 more sources

Integrating PCA and DEA techniques for strategic assessment of network security [PDF]

open access: yesComputational Algorithms and Numerical Dimensions, 2023
Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network.
Reza Rasinojehdehi, Seyyed Najafi
doaj   +1 more source

Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems [PDF]

open access: yesIEEE Transactions on Sustainable Computing, 2021
Cyber-physical-social systems (CPSS) are revolutionizing the relationships between humans, computers, and things. Outsourcing computation to the cloud can offer resources-constrained enterprises and consumers sustainable computing in CPSS. However, ensuring the security of data in such an outsourced environment remains a research challenge.
Feng, Jun   +6 more
openaire   +4 more sources

Voice Feature Extraction for Gender and Emotion Recognition [PDF]

open access: yesITM Web of Conferences, 2021
Voice recognition plays a key function in spoken communication that facilitates identifying the emotions of a person that reflects within the voice. Gender classification through speech is a popular Human Computer Interaction (HCI) method on account that
Nashipudimath Madhu M.   +4 more
doaj   +1 more source

Fuzzy based intrusion detection system in MANET

open access: yesMeasurement: Sensors, 2023
The rapid development and popularization of the Mobile Adhoc Network (MANET) have brought many security issues in network. Intrusion detection system, an effective security technology which can efficiently detect malicious data in complex network ...
C. Edwin Singh, S. Maria Celestin Vigila
doaj   +1 more source

ThreadLock: Native Principal Isolation Through Memory Protection Keys

open access: yesACM Asia Conference on Computer and Communications Security, 2023
Inter-process isolation has been deployed in operating systems for decades, but secure intra-process isolation remains an active research topic. Achieving secure intra-process isolation within an operating system process is notoriously difficult. However,
William Blair   +2 more
semanticscholar   +1 more source

Network intrusion detection using oversampling technique and machine learning algorithms [PDF]

open access: yesPeerJ Computer Science, 2022
The expeditious growth of the World Wide Web and the rampant flow of network traffic have resulted in a continuous increase of network security threats. Cyber attackers seek to exploit vulnerabilities in network architecture to steal valuable information
Hafiza Anisa Ahmed   +2 more
doaj   +2 more sources

Midgar: Detection of people through computer vision in the Internet of Things scenarios to improve the security in Smart Cities, Smart Towns, and Smart Homes [PDF]

open access: yesFuture generations computer systems, 2017
Could we use Computer Vision in the Internet of Things for using pictures as sensors? This is the principal hypothesis that we want to resolve. Currently, in order to create safety areas, cities, or homes, people use IP cameras. Nevertheless, this system
Cristian González García   +4 more
semanticscholar   +1 more source

SecDH: Security of COVID-19 images based on data hiding with PCA

open access: yesComputer Communications, 2022
Nowadays, image security and copyright protection become challenging, especially after the COVID-19 pandemic. In the paper, we develop SecDH as a medical data hiding scheme, which can guarantee the security and copyright protection of the COVID-19 images.
O. Singh   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy