Search
Search Results
-
Exploring the Current Landscape of Cyberterrorism: Insights, Strategies, and the Impact of COVID-19
Governments worldwide are confronted with the formidable challenge of safeguarding their populations and critical infrastructures against... -
The Impact of Technology on Radicalisation to Violent Extremism and Terrorism in the Contemporary Security Landscape
The widespread integration of digital technologies including the internet, Internet of Things (IoT), and social media platforms (SMPs) has ushered in... -
The Impact of Facial Recognition Technology on the Fundamental Right to Privacy and Associated Recommendations
The rapid proliferation of biometric technologies, particularly facial recognition, has extended its reach across both public and private spheres,... -
Responding to Deepfake Challenges in the United Kingdom: Legal and Technical Insights with Recommendations
The rapid progression of Deep Machine Learning (DML) and Artificial Intelligence (AI) technologies over the past decade has ushered in a new era of... -
Wildland Firefighters: A Crucial Weapon for Forest Fire Management. Which Health Risks Do They Face?
Fire when uncontrolled can become a destructive force that risks wildlife, property, and human lives. Global warming has contributed to the increase... -
Internet of Everything: Evolution and Fundamental Concepts
Internet of Everything (IoE) was used in 2012 as a network of networks by using intelligent network connections. These networks offered a great... -
Attack Detection Mechanisms for Internet of Everything (IoE) Networks
Internet of Everything (IoE) is one of the superset concepts of Internet of Thing (IoT) based on emerging and revolutionary technologies and... -
Future Cybersecurity Challenges for IoE Networks
The concept of smart communication systems evidently changed the way the computers were initially thought to be. Irrespective of the evolution in... -
Cybersecurity Threats and Attacks in IoE Networks
The increasing interconnectedness and intelligence of everything are fostering digital transformation across industries. Nonetheless, the advent of... -
Evaluating the Security of Open-Source Linux Operating Systems for Unmanned Aerial Vehicles
The proliferation of unmanned aerial vehicles (UAVs), commonly known as drones, has brought substantial benefits across various industries. However,... -
A Signcryption Approach to Address Security and Privacy Issues in Online Gaming Platforms
Online game has become increasingly popular with people of all ages. But it also poses a number of security and privacy risks and children are... -
Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error
As life becomes more digitally oriented, we need to emphasize cybersecurity and its awareness. Particularly in industries such as medicine and... -
Metaverse Application Forensics: Unravelling the Virtual Truth
Virtual reality (VR) has gained significant popularity and recognition in recent years due to its immersive experiences and widespread adoption.... -
A Proposed Permissioned Blockchain Consensus Algorithm: Consensus Algorithm Genetically Enhanced (CAGE)
Blockchain technology is disruptive and relies on the development of consensus algorithms, CAs. Currently, there are many CAs proposed and this paper... -
The Influence of Information Communication Technology Towards the Success of Ro-Ro Ferry Service at Penang Port
The purpose of this study is to investigate the influence of information communication technology (CT) towards the successful Ro-Ro ferry service at... -
Designing an Augmented Reality Application as a Tool for Entomophobia Treatment
Fear of insects or entomophobia is a prevalent phobia that causes irrational fear of insects. People suffering from entomophobia are afraid of... -
Two Factor Authentication: Voice Biometric and Token-Based Authentication
For many years, the issue with traditional single-schema password-based authentication systems has been the lack of security. Billions of passwords... -
Development of a Forest Fire Prevention System Using Fuzzy Logic Control
The burning of peatland forests contributes significantly to the increase in carbon dioxide levels. Land and forest fires are a severe concern that... -
Computer Simulation of a Prefabricated Spatial Framework
The object of the study is a spatial hinge-rod structure. The research method—the analysis of the wide variability of the forms of hinge-rod joints,... -
Modification of Fine Multicomponent Concrete with Activated Component-Based Additive
In accordance with modern requirements for building materials, concrete must be of high quality with minimal resource waste. Using the initial...