We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Intrusion Detection and Prevention

    Intrusion detection and prevention are security measures used to detect and prevent cybersecurity risks to computer systems, networks, infrastructure...
    Chapter 2023
  2. Attribute Repair for Threat Prevention

    We propose a model-based procedure for preventing security threats using formal models. We encode system models and threats as satisfiability modulo...
    Thorsten Tarrach, Masoud Ebrahimi, ... Dejan Ničković in Computer Safety, Reliability, and Security
    Conference paper 2023
  3. Advance Collision Prevention System

    This chapter presents the efficient working model of the Advance Collision Prevention System (ACP System) using computer vision and machine learning...
    Namrata Singh, Meenakshi Srivastava, ... Prashant Singh in Advanced Communication and Intelligent Systems
    Conference paper 2023
  4. Delving NFT vulnerabilities, a sleepminting prevention system

    The rise of Non-Fungible Tokens (NFTs) is beginning to revolutionize the digital world thanks to the unique property of these tokens. Indeed, they...

    Barbara Guidi, Andrea Michienzi in Multimedia Tools and Applications
    Article Open access 08 July 2023
  5. Design of distributed network intrusion prevention system based on Spark and P2DR models

    The commonly used method for network intrusion is based on pattern matching systems, but these systems do not have high detection accuracy when...

    Lei An, Jiankai Qiu, ... Chen Liu in Cluster Computing
    Article 11 May 2024
  6. Surveillance, Prevention, and Control of Infectious Diseases An AI Perspective

    This is a pioneering book that delves into the intersection of artificial intelligence (AI) and healthcare, specifically focusing on the detection...

    Muhammad E. H. Chowdhury, Serkan Kiranyaz
    Book 2024
  7. Overview of Social Engineering Protection and Prevention Methods

    Recently, with the increasing use of social networks, services, and computers in general plus the enhanced capabilities of remote working,...
    Konstantinos Kontogeorgopoulos, Kyriakos Kritikos in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  8. Cancer Prevention Through Early Detection Second International Workshop, CaPTion 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 12, 2023, Proceedings

    This book constitutes the refereed proceedings of the second International Workshop on Cancer Prevention through Early Detection, CaPTion, held in...
    Sharib Ali, Fons van der Sommen, ... Iris Kolenbrander in Lecture Notes in Computer Science
    Conference proceedings 2023
  9. Understanding and Modeling Prevention

    Prevention is a pervasive phenomenon. It is about blocking an effect before it happens or stop** it as it unfolds: vaccines prevent (the unfolding...
    Riccardo Baratella, Mattia Fumagalli, ... Giancarlo Guizzardi in Research Challenges in Information Science
    Conference paper 2022
  10. Hearing loss prevention at loud music events via real-time visuo-haptic feedback

    Hearing loss is becoming a global problem, partly as a consequence of exposure to loud music. People may be unaware about the harmful sound levels...

    Luca Turchet, Simone Luiten, ... Alberto Boem in Journal on Multimodal User Interfaces
    Article Open access 13 October 2023
  11. A multi-criteria decision making based integrated approach for rumor prevention in social networks

    Rumors are unverified pieces of information whose veracity status is unknown at the time of circulation. Preventing them at an early stage helps to...

    Shruti Bajpai, Amrita Chaturvedi in Multimedia Tools and Applications
    Article 12 February 2024
  12. A Survey on Intrusion Detection and Prevention Systems

    In the digital world, malicious activities that violate the confidentiality, integrity, or availability of data and devices are known as intrusions....

    Neha Gupta, Vinita **dal, Punam Bedi in SN Computer Science
    Article 10 June 2023
  13. Personal space invasion to prevent cyberbullying: design, development, and evaluation of an immersive prevention measure for children and adolescents

    The previous work on cyberbullying has shown that the number of victims is increasing, and the need for prevention is exceptionally high among...

    Carolin Wienrich, Viktoria Horn, ... Arne Bürger in Virtual Reality
    Article Open access 15 March 2024
  14. System Intrusion Detection and Prevention

    Psychologically there is value attached to ownership of an asset. How much is spent on protecting the asset determines the value of the asset. Once a...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  15. Cyber Crisis Prevention

    Wie bei allen Krisen kommt es auch bei Cyber-Krisen darauf an, inwieweit das Ereignis schon außerhalb der Organisation sichtbar ist. Faustregel: je...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
  16. CAPTAIN: An AI-Based Chatbot for Cyberbullying Prevention and Intervention

    Cyberbullying is a widespread and growing problem that can cause various psychological and health well-being outcomes in youth and is considered a...
    Andrew T. Lian, Alfredo Costilla Reyes, **a Hu in Artificial Intelligence in HCI
    Conference paper 2023
  17. Threats on online social network platforms: classification, detection, and prevention techniques

    Online social network (OSN) platforms have been incorporated into people's daily lives. A significant portion of society employs various forms of OSN...

    Akash Shah, Sapna Varshney, Monica Mehrotra in Multimedia Tools and Applications
    Article 02 July 2024
  18. FPGA-Enabled Efficient Framework for High-Performance Intrusion Prevention Systems

    With the rapid increase of network-based services during and after the COVID-19 pandemic, preventing network attacks is an essential demand. This...
    Conference paper 2023
  19. A survey: contribution of ML & DL to the detection & prevention of botnet attacks

    Machine Learning (ML) and Deep Learning (DL) are transforming the detection and prevention of botnets, significant threats in cybersecurity. In this...

    Yassine EL Yamani, Youssef Baddi, Najib EL Kamoun in Journal of Reliable Intelligent Environments
    Article 24 June 2024
  20. Defending Against Vishing Attacks: A Comprehensive Review for Prevention and Mitigation Techniques

    Vishing attacks, or voice phishing attacks, are a type of social engineering attack in which attackers use voice communication channels, such as...
    Shaikh Ashfaq, Pankaj Chandre, ... Parikshit Mahalle in Cyber Security and Digital Forensics
    Conference paper 2024
Did you find what you were looking for? Share feedback.