Results 1 to 10 of about 579,373 (256)

Security Implications of AI Chatbots in Health Care

open access: yesJournal of Medical Internet Research, 2023
Artificial intelligence (AI) chatbots like ChatGPT and Google Bard are computer programs that use AI and natural language processing to understand customer questions and generate natural, fluid, dialogue-like responses to their inputs. ChatGPT,
Jingquan Li
doaj   +2 more sources

The application of blockchain technology in data trading: a systematic review [PDF]

open access: yesPeerJ Computer Science
In the era of exponential data growth, the imperative to establish secure and efficient data trading mechanisms has become paramount. While traditional centralized architectures present critical limitations in security and operational efficiency, the ...
Wei Xiong, Huaibin Shao, Hong Ge
doaj   +3 more sources

Integrating PCA and DEA techniques for strategic assessment of network security [PDF]

open access: yesComputational Algorithms and Numerical Dimensions, 2023
Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network.
Reza Rasinojehdehi, Seyyed Najafi
doaj   +1 more source

Voice Feature Extraction for Gender and Emotion Recognition [PDF]

open access: yesITM Web of Conferences, 2021
Voice recognition plays a key function in spoken communication that facilitates identifying the emotions of a person that reflects within the voice. Gender classification through speech is a popular Human Computer Interaction (HCI) method on account that
Nashipudimath Madhu M.   +4 more
doaj   +1 more source

Fuzzy based intrusion detection system in MANET

open access: yesMeasurement: Sensors, 2023
The rapid development and popularization of the Mobile Adhoc Network (MANET) have brought many security issues in network. Intrusion detection system, an effective security technology which can efficiently detect malicious data in complex network ...
C. Edwin Singh, S. Maria Celestin Vigila
doaj   +1 more source

Network intrusion detection using oversampling technique and machine learning algorithms [PDF]

open access: yesPeerJ Computer Science, 2022
The expeditious growth of the World Wide Web and the rampant flow of network traffic have resulted in a continuous increase of network security threats. Cyber attackers seek to exploit vulnerabilities in network architecture to steal valuable information
Hafiza Anisa Ahmed   +2 more
doaj   +2 more sources

A Method of Intrusion Detection Based on WOA-XGBoost Algorithm

open access: yesDiscrete Dynamics in Nature and Society, 2022
With the development of information technology, computer networks have become a part of people’s lives and work. However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks ...
Yan Song, Haowei Li, Panfeng Xu, Dan Liu
doaj   +1 more source

Evaluation of Medical Level in China by Provinces Based on Principal Component Analysis and TOPSIS Model [PDF]

open access: yesZhongguo quanke yixue, 2023
Background During the nationwide epidemic of COVID-19 infection, the spatial agglomeration of medical resources in China has been highlighted, and there are obvious differences in medical level among provinces.
ZHOU Jie, HU Lingjuan, HUAI Qingyu
doaj   +1 more source

A machine learning-based intrusion detection for detecting internet of things network attacks

open access: yesAlexandria Engineering Journal, 2022
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy and security risks—the ...
Yakub Kayode Saheed   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy