Results 1 to 10 of about 446,967 (129)

The application of blockchain technology in data trading: a systematic review [PDF]

open access: yesPeerJ Computer Science
In the era of exponential data growth, the imperative to establish secure and efficient data trading mechanisms has become paramount. While traditional centralized architectures present critical limitations in security and operational efficiency, the ...
Wei Xiong, Huaibin Shao, Hong Ge
doaj   +3 more sources

Integrating PCA and DEA techniques for strategic assessment of network security [PDF]

open access: yesComputational Algorithms and Numerical Dimensions, 2023
Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network.
Reza Rasinojehdehi, Seyyed Najafi
doaj   +1 more source

Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems [PDF]

open access: yesIEEE Transactions on Sustainable Computing, 2021
Cyber-physical-social systems (CPSS) are revolutionizing the relationships between humans, computers, and things. Outsourcing computation to the cloud can offer resources-constrained enterprises and consumers sustainable computing in CPSS. However, ensuring the security of data in such an outsourced environment remains a research challenge.
Feng, Jun   +6 more
openaire   +5 more sources

Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? [PDF]

open access: yesEnergy Informatics, 2021
AbstractDistributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements.
Sampath Kumar Venkatachary   +2 more
openaire   +4 more sources

Voice Feature Extraction for Gender and Emotion Recognition [PDF]

open access: yesITM Web of Conferences, 2021
Voice recognition plays a key function in spoken communication that facilitates identifying the emotions of a person that reflects within the voice. Gender classification through speech is a popular Human Computer Interaction (HCI) method on account that
Nashipudimath Madhu M.   +4 more
doaj   +1 more source

Fuzzy based intrusion detection system in MANET

open access: yesMeasurement: Sensors, 2023
The rapid development and popularization of the Mobile Adhoc Network (MANET) have brought many security issues in network. Intrusion detection system, an effective security technology which can efficiently detect malicious data in complex network ...
C. Edwin Singh, S. Maria Celestin Vigila
doaj   +1 more source

Security Implications of AI Chatbots in Health Care

open access: yesJournal of Medical Internet Research, 2023
Artificial intelligence (AI) chatbots like ChatGPT and Google Bard are computer programs that use AI and natural language processing to understand customer questions and generate natural, fluid, dialogue-like responses to their inputs. ChatGPT,
Jingquan Li
doaj   +1 more source

Network intrusion detection using oversampling technique and machine learning algorithms [PDF]

open access: yesPeerJ Computer Science, 2022
The expeditious growth of the World Wide Web and the rampant flow of network traffic have resulted in a continuous increase of network security threats. Cyber attackers seek to exploit vulnerabilities in network architecture to steal valuable information
Hafiza Anisa Ahmed   +2 more
doaj   +2 more sources

A Method of Intrusion Detection Based on WOA-XGBoost Algorithm

open access: yesDiscrete Dynamics in Nature and Society, 2022
With the development of information technology, computer networks have become a part of people’s lives and work. However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks ...
Yan Song, Haowei Li, Panfeng Xu, Dan Liu
doaj   +1 more source

Evaluation of Medical Level in China by Provinces Based on Principal Component Analysis and TOPSIS Model [PDF]

open access: yesZhongguo quanke yixue, 2023
Background During the nationwide epidemic of COVID-19 infection, the spatial agglomeration of medical resources in China has been highlighted, and there are obvious differences in medical level among provinces.
ZHOU Jie, HU Lingjuan, HUAI Qingyu
doaj   +1 more source

Home - About - Disclaimer - Privacy