Results 1 to 10 of about 126 (75)
Domain-Agnostic Representation of Side-Channels [PDF]
Side channels are unintended pathways within target systems that leak internal target information. Side-channel sensing (SCS) is the process of exploiting side channels to extract embedded target information.
Aaron Spence, Shaun Bangay
doaj +2 more sources
Adaptive malware identification via integrated SimCLR and GRU networks [PDF]
Malware has become a big issue for digital infrastructure with the growing complexity and frequency of intrusions; it usually avoids conventional detection systems via obfuscation and dynamic behaviour patterns.
Faisal S. Alsubaei +5 more
doaj +2 more sources
BERT ensemble based MBR framework for android malware detection [PDF]
Predicting attacks in Android Malware (AM) devices within recommender systems-based IoT is challenging. A novel framework is presented in this study for AM Detection (AMD) using BERT Ensemble (MBR) and MobileNetV2.
Faisal S. Alsubaei +5 more
doaj +2 more sources
Strengthening the Security of Smart Contracts through the Power of Artificial Intelligence
Smart contracts (SCs) are digital agreements that execute themselves and are stored on a blockchain. Despite the fact that they offer numerous advantages, such as automation and transparency, they are susceptible to a variety of assaults due to their ...
Moez Krichen
doaj +1 more source
Gamifying cybersecurity: A narrative-driven approach to teaching steganography
Serious games are increasingly used in educational settings to enhance student engagement and support deeper learning. While research shows that such games can improve holistic understanding and knowledge retention, their application in specialised ...
Femke G.J. Weijsenfeld, Dipti K. Sarmah
doaj +1 more source
The application of cybersecurity in smart city innovations: an AI aspect
Internet of Things (IoT), Artificial Intelligence (AI), and Machine Learning (ML) have enabled "Smart Cities," opening up new municipal governance and civic participation prospects.
Нараян Чандра Натх +1 more
doaj +1 more source
The rising incidence of cyber-attacks on critical infrastructure and power grids poses significant threats to the stability and reliability of electrical substations, with potentially devastating consequences such as extended blackouts.
Mansi Girdhar +4 more
doaj +1 more source
WiPhi: using location-specific WiFi signals for password hardening and improvement
Having a strong password is vital in maintaining secure access to private or sensitive data. However, strong passwords require good memorization skills, placing a significant burden on human memory and cognitive capacity.
Philipp Christian Arnold +2 more
doaj +1 more source
Analysis of the Barriers to Smart City Development Using DEMATEL
This study analyzes the barriers to developing smart cities (SCs) using the decision-making trial and evaluation laboratory (DEMATEL) approach. The primary objective is to identify, classify, and assess the main barriers hindering the progress of SCs ...
Anas A. Makki, Ammar Y. Alqahtani
doaj +1 more source
Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT. [PDF]
Alamri B, Crowley K, Richardson I.
europepmc +1 more source

