We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Exploring the Current Landscape of Cyberterrorism: Insights, Strategies, and the Impact of COVID-19

    Governments worldwide are confronted with the formidable challenge of safeguarding their populations and critical infrastructures against...
    Chapter 2024
  2. The Impact of Technology on Radicalisation to Violent Extremism and Terrorism in the Contemporary Security Landscape

    The widespread integration of digital technologies including the internet, Internet of Things (IoT), and social media platforms (SMPs) has ushered in...
    Chapter 2024
  3. The Impact of Facial Recognition Technology on the Fundamental Right to Privacy and Associated Recommendations

    The rapid proliferation of biometric technologies, particularly facial recognition, has extended its reach across both public and private spheres,...
    Chapter 2024
  4. Responding to Deepfake Challenges in the United Kingdom: Legal and Technical Insights with Recommendations

    The rapid progression of Deep Machine Learning (DML) and Artificial Intelligence (AI) technologies over the past decade has ushered in a new era of...
    Chapter 2024
  5. Wildland Firefighters: A Crucial Weapon for Forest Fire Management. Which Health Risks Do They Face?

    Fire when uncontrolled can become a destructive force that risks wildlife, property, and human lives. Global warming has contributed to the increase...
    Filipa Esteves, Joana Madureira, ... Solange Costa in Fire Hazards: Socio-economic and Regional Issues
    Chapter Open access 2024
  6. Internet of Everything: Evolution and Fundamental Concepts

    Internet of Everything (IoE) was used in 2012 as a network of networks by using intelligent network connections. These networks offered a great...
    Kashif Naseer Qureshi, Thomas Newe, ... Abdellah Chehri in Cybersecurity Vigilance and Security Engineering of Internet of Everything
    Chapter 2024
  7. Attack Detection Mechanisms for Internet of Everything (IoE) Networks

    Internet of Everything (IoE) is one of the superset concepts of Internet of Thing (IoT) based on emerging and revolutionary technologies and...
    Chapter 2024
  8. Future Cybersecurity Challenges for IoE Networks

    The concept of smart communication systems evidently changed the way the computers were initially thought to be. Irrespective of the evolution in...
    Saleem Iqbal, Saqib Majeed, Syed Amad Hussain Shah in Cybersecurity Vigilance and Security Engineering of Internet of Everything
    Chapter 2024
  9. Cybersecurity Threats and Attacks in IoE Networks

    The increasing interconnectedness and intelligence of everything are fostering digital transformation across industries. Nonetheless, the advent of...
    Chapter 2024
  10. Evaluating the Security of Open-Source Linux Operating Systems for Unmanned Aerial Vehicles

    The proliferation of unmanned aerial vehicles (UAVs), commonly known as drones, has brought substantial benefits across various industries. However,...
    Conference paper 2024
  11. A Signcryption Approach to Address Security and Privacy Issues in Online Gaming Platforms

    Online game has become increasingly popular with people of all ages. But it also poses a number of security and privacy risks and children are...
    Conference paper 2024
  12. Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error

    As life becomes more digitally oriented, we need to emphasize cybersecurity and its awareness. Particularly in industries such as medicine and...
    Galathara Kahanda, Sasha Rider, Sayantini Mukhopadhyay in Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs
    Conference paper 2024
  13. Metaverse Application Forensics: Unravelling the Virtual Truth

    Virtual reality (VR) has gained significant popularity and recognition in recent years due to its immersive experiences and widespread adoption....
    Conference paper 2024
  14. A Proposed Permissioned Blockchain Consensus Algorithm: Consensus Algorithm Genetically Enhanced (CAGE)

    Blockchain technology is disruptive and relies on the development of consensus algorithms, CAs. Currently, there are many CAs proposed and this paper...
    Conference paper 2024
  15. The Influence of Information Communication Technology Towards the Success of Ro-Ro Ferry Service at Penang Port

    The purpose of this study is to investigate the influence of information communication technology (CT) towards the successful Ro-Ro ferry service at...
    Siti Aisyah Wahab, Amayrol Zakaria, Aminuddin Md Arof in Applied Problems Solved by Information Technology and Software
    Chapter 2024
  16. Designing an Augmented Reality Application as a Tool for Entomophobia Treatment

    Fear of insects or entomophobia is a prevalent phobia that causes irrational fear of insects. People suffering from entomophobia are afraid of...
    Masyarah Zulhaida Masmuzidin, Nur Syahela Hussien, ... Wan Shazlina Wan Ismail in Applied Problems Solved by Information Technology and Software
    Chapter 2024
  17. Two Factor Authentication: Voice Biometric and Token-Based Authentication

    For many years, the issue with traditional single-schema password-based authentication systems has been the lack of security. Billions of passwords...
    Herny Ramadhani Mohd Husny Hamid, Nur Wazir Nordin, ... Dalilah Abdullah in Applied Problems Solved by Information Technology and Software
    Chapter 2024
  18. Development of a Forest Fire Prevention System Using Fuzzy Logic Control

    The burning of peatland forests contributes significantly to the increase in carbon dioxide levels. Land and forest fires are a severe concern that...
    Daniel Shafiq Faizal Parish, Mohd Aliff Afira Sani, ... Sairul Izwan Safie in Applied Problems Solved by Information Technology and Software
    Chapter 2024
  19. Computer Simulation of a Prefabricated Spatial Framework

    The object of the study is a spatial hinge-rod structure. The research method—the analysis of the wide variability of the forms of hinge-rod joints,...
    Conference paper 2024
  20. Modification of Fine Multicomponent Concrete with Activated Component-Based Additive

    In accordance with modern requirements for building materials, concrete must be of high quality with minimal resource waste. Using the initial...
    Conference paper 2024
Did you find what you were looking for? Share feedback.