We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 537 results
  1. A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures

    The recent integration and collaboration of robots with networks expose new challenges and problems in terms of security. However, to the best of our...

    **ngmao Shao, Lun **e, ... Zhiliang Wang in Journal of Intelligent & Robotic Systems
    Article 03 November 2023
  2. Survey on Botnet Detection Techniques

    Due to unpleasant market competition, IT companies are releasing the software or applications without much considering the unintended security...
    Rahul Mishra, Sudhanshu Kumar Jha in Internet of Things and Its Applications
    Conference paper 2022
  3. Authentication with Bioelectrical Signals

    Within a normal range of biological signals, one signal of a subject shows a unique pattern that differentiates it from signals originating from...
    Kwang Suk Park in Humans and Electricity
    Chapter 2023
  4. Steganography using wavelet transform for secured data transmission

    The secure transfer of data (alphanumeric and byte data) is critical in information technology. In general, cryptography is used to safeguard data...

    Lingamallu Naga Srinivasu, Vijayaraghavan Veeramani in Journal of Ambient Intelligence and Humanized Computing
    Article 24 May 2023
  5. Detecting Semantic Social Engineering Attack in the Context of Information Security

    In IEEE 802.11 standard, the management frames are sent unencrypted, so the network name (SSID), MAC address (BSSID), and/or IP address can be easily...
    Eman Ali Metwally, Noha A. Haikal, Hassan Hussein Soliman in Digital Transformation Technology
    Conference paper 2022
  6. Probability Boosted Regression for Intrusion Detection in Cyberactive Space

    Protecting cyber-physical infrastructure from random network attacks is critical in this age of widespread Internet connectivity. This will prevent...
    Conference paper 2024
  7. Real-Time Human Locator and Advance Home Security Appliances

    In this modern era, human safety has become an important issue. In the past years, crimes against girls and children have raised significantly. In...
    Anand Kesharwani, Animesh Nag, ... Ashutosh Kumar Singh in Evolutionary Computing and Mobile Sustainable Networks
    Conference paper 2021
  8. Trust-Free Homes: The Zero-Trust Paradigm in a Smart Home Setting

    The Internet of Things (IoT) is one of the novel concepts which has taken the world by storm. Although the technology holds many advantages, the...
    Aditya Damodhar Dhanapal, S. M. Anantha Ramanujan, V. Jeyalakshmi in Communication Technologies and Security Challenges in IoT
    Chapter 2024
  9. Machine Learning for Automotive Cybersecurity: Challenges, Opportunities and Future Directions

    Connected autonomous vehicles (CAVs) hold the promise of not only improving functional safety but also improving mobility and the efficiency of...
    Rafi Ud Daula Refat, Abdulrahman Abu Elkhail, Hafiz Malik in AI-enabled Technologies for Autonomous and Connected Vehicles
    Chapter 2023
  10. DPETAs: Detection and Prevention of Evil Twin Attacks on Wi-Fi Networks

    Numerous types of threats could become vulnerable to Wi-Fi networks. In terms of preventing and reducing their effect on the networks, it has become...
    Fanar Fareed Hanna Rofoo, Mohammed Gouse Galety, ... Rebaz Maaroof in Sustainable Advanced Computing
    Conference paper 2022
  11. UAV low-altitude obstacle detection based on the fusion of LiDAR and camera

    In this paper, aiming at the flying scene of the small unmanned aerial vehicle (UAV) in the low-altitude suburban environment, we choose the sensor...

    Zhaowei Ma, Wenchen Yao, ... Tianqing Liu in Autonomous Intelligent Systems
    Article Open access 26 November 2021
  12. Identification of Face by Using CNN and Deep Learning Algorithms

    The development of advanced computers and upgraded cameras have propelled research toward designing facial recognition systems for various facial...
    Hari Padmavathi Madala, Dharani Daparti, ... P. V. Sivarambabu in Mobile Computing and Sustainable Informatics
    Conference paper 2023
  13. Maritime Surveillance Using Instance Segmentation Techniques

    A maritime surveillance system is vital in detecting objects threatening national security and violating the maritime border. Many small and...
    Rabi Sharma, Muhammad Saqib, ... Michael Blumenstein in Data Science and Communication
    Conference paper 2024
  14. Credit Card Fraud Detection Using Deep Learning for Internet-of-Things Enabled Smart Digital Financial System

    It is crucial to adhere to established protocols and effective techniques to prevent the theft of any sensitive information when paying with a credit...
    Anchal Chand, Sachin Sharma, ... Seshadri Mohan in Communication Technologies and Security Challenges in IoT
    Chapter 2024
  15. Panorama: A Multi-language Software Information Prospecting Facility

    This paper concerns the development of both theoretical and operational frameworks, called Panorama, for comprehending large scale, multi-lingual...
    V. Lakshmi Narasimhan, R. V. Krishna in ICT: Innovation and Computing
    Conference paper 2024
  16. SISA: Securing Images by Selective Alteration

    Gaherwar, Prutha Joshi, Shraddha Joshi, Raviraj Khengare, RahulWith an increase in mobile and camera devices’ popularity, digital content in the form...
    Prutha Gaherwar, Shraddha Joshi, ... Rahul Khengare in Information and Communication Technology for Competitive Strategies (ICTCS 2020)
    Conference paper 2022
  17. Manual and Automatic Control of Appliances Based on Integration of WSN and IOT Technology

    As indicated by the Internet of Things, the future home the purported Smart Home, will be a consistent mix of actual savvy objects, interfacing,...
    S. Karthikeyan, Adusumalli Nishanth, ... T. Ravi in Emergent Converging Technologies and Biomedical Systems
    Conference paper 2022
  18. Critical Analysis of Secure Strategies Against Threats on Cloud Platform

    Cloud computing is one of the popular topics of the current internet world. Cloud computing technology no doubt makes life simple and easier by...
    Gaganpreet Kaur, Sandeep Kaur in Mobile Radio Communications and 5G Networks
    Conference paper 2023
  19. IDS-PSO-BAE: The Ensemble Method for Intrusion Detection System Using Bagging–Autoencoder and PSO

    In recent days, for security services, an intrusion detection system (IDS) is a highly effective solution (Louk MHL, Tama BA. “PSO-Driven Feature...
    Kampa Lavanya, Y Sowmya Reddy, ... Kukkadapu Lakshmi Meghana in International Conference on Innovative Computing and Communications
    Conference paper 2024
  20. A New Approach to Coupled IR Sensor-Based Real-Time System for Alerting Elderly People of Accidents in Rest Room

    In this paper, an IR sensor-based Real-Time Rest Room system helps in detecting accidents or abrupt falling, or movements of elderly people when they...
    Conference paper 2023
Did you find what you were looking for? Share feedback.