Security Implications of AI Chatbots in Health Care
Artificial intelligence (AI) chatbots like ChatGPT and Google Bard are computer programs that use AI and natural language processing to understand customer questions and generate natural, fluid, dialogue-like responses to their inputs. ChatGPT,
Jingquan Li
doaj +2 more sources
The application of blockchain technology in data trading: a systematic review [PDF]
In the era of exponential data growth, the imperative to establish secure and efficient data trading mechanisms has become paramount. While traditional centralized architectures present critical limitations in security and operational efficiency, the ...
Wei Xiong, Huaibin Shao, Hong Ge
doaj +3 more sources
Integrating PCA and DEA techniques for strategic assessment of network security [PDF]
Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network.
Reza Rasinojehdehi, Seyyed Najafi
doaj +1 more source
Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems [PDF]
Cyber-physical-social systems (CPSS) are revolutionizing the relationships between humans, computers, and things. Outsourcing computation to the cloud can offer resources-constrained enterprises and consumers sustainable computing in CPSS. However, ensuring the security of data in such an outsourced environment remains a research challenge.
Feng, Jun +6 more
openaire +4 more sources
Voice Feature Extraction for Gender and Emotion Recognition [PDF]
Voice recognition plays a key function in spoken communication that facilitates identifying the emotions of a person that reflects within the voice. Gender classification through speech is a popular Human Computer Interaction (HCI) method on account that
Nashipudimath Madhu M. +4 more
doaj +1 more source
Fuzzy based intrusion detection system in MANET
The rapid development and popularization of the Mobile Adhoc Network (MANET) have brought many security issues in network. Intrusion detection system, an effective security technology which can efficiently detect malicious data in complex network ...
C. Edwin Singh, S. Maria Celestin Vigila
doaj +1 more source
ThreadLock: Native Principal Isolation Through Memory Protection Keys
Inter-process isolation has been deployed in operating systems for decades, but secure intra-process isolation remains an active research topic. Achieving secure intra-process isolation within an operating system process is notoriously difficult. However,
William Blair +2 more
semanticscholar +1 more source
Network intrusion detection using oversampling technique and machine learning algorithms [PDF]
The expeditious growth of the World Wide Web and the rampant flow of network traffic have resulted in a continuous increase of network security threats. Cyber attackers seek to exploit vulnerabilities in network architecture to steal valuable information
Hafiza Anisa Ahmed +2 more
doaj +2 more sources
Midgar: Detection of people through computer vision in the Internet of Things scenarios to improve the security in Smart Cities, Smart Towns, and Smart Homes [PDF]
Could we use Computer Vision in the Internet of Things for using pictures as sensors? This is the principal hypothesis that we want to resolve. Currently, in order to create safety areas, cities, or homes, people use IP cameras. Nevertheless, this system
Cristian González García +4 more
semanticscholar +1 more source
SecDH: Security of COVID-19 images based on data hiding with PCA
Nowadays, image security and copyright protection become challenging, especially after the COVID-19 pandemic. In the paper, we develop SecDH as a medical data hiding scheme, which can guarantee the security and copyright protection of the COVID-19 images.
O. Singh +3 more
semanticscholar +1 more source

