Security Implications of AI Chatbots in Health Care
Artificial intelligence (AI) chatbots like ChatGPT and Google Bard are computer programs that use AI and natural language processing to understand customer questions and generate natural, fluid, dialogue-like responses to their inputs. ChatGPT,
Jingquan Li
doaj +2 more sources
Soft Constraint Programming to Analysing Security Protocols [PDF]
Security protocols stipulate how the remote principals of a computer network should interact in order to obtain specific security goals. The crucial goals of confidentiality and authentication may be achieved in various forms, each of different strength.
Bella, Giampaolo, Bistarelli, Stefano
arxiv +4 more sources
PPCA: Privacy-preserving Principal Component Analysis Using Secure Multiparty Computation(MPC) [PDF]
Privacy-preserving data mining has become an important topic. People have built several multi-party-computation (MPC)-based frameworks to provide theoretically guaranteed privacy, the poor performance of real-world algorithms have always been a challenge.
Fan, Xiaoyu+4 more
arxiv +3 more sources
A Review of Automated Image Understanding within 3D Baggage Computed Tomography Security Screening [PDF]
Baggage inspection is the principal safeguard against the transportation of prohibited and potentially dangerous materials at airport security checkpoints.
Breckon, T.P., Mouton, A.
core +3 more sources
An Overview on Data Security in Cloud Computing [PDF]
Cloud Computing refers to the use of computer resources as a service on-demand via internet. It is mainly based on data and applications outsourcing, traditionally stored on users' computers, to remote servers (datacenters) owned, administered and managed by third parts. This paper is an overview of data security issues in the cloud computing.
Lynda Kacha, Abdelhafid Zitouni
arxiv +2 more sources
Belief Semantics of Authorization Logic [PDF]
Authorization logics have been used in the theory of computer security to reason about access control decisions. In this work, a formal belief semantics for authorization logics is given. The belief semantics is proved to subsume a standard Kripke semantics.
Clarkson, Michael R., Hirsch, Andrew K.
arxiv +3 more sources
An Efficient Support Vector Machine Algorithm Based Network Outlier Detection System
With the increase of cyber-attacks and security threats in the recent decade, it is necessary to safeguard sensitive data and provide robust protection to information systems and computer networks.
Omar Alghushairy+6 more
doaj +2 more sources
Integrating PCA and DEA techniques for strategic assessment of network security [PDF]
Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network.
Reza Rasinojehdehi, Seyyed Najafi
doaj +1 more source
Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems [PDF]
Cyber-physical-social systems (CPSS) are revolutionizing the relationships between humans, computers, and things. Outsourcing computation to the cloud can offer resources-constrained enterprises and consumers sustainable computing in CPSS. However, ensuring the security of data in such an outsourced environment remains a research challenge.
Jun Feng+5 more
openaire +4 more sources
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? [PDF]
AbstractDistributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements.
Sampath Kumar Venkatachary+2 more
openaire +4 more sources