-
181
Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things
Published 2019-04-01“…When attacks on IoT networks go undetected for longer periods, it affects availability of critical systems for end users, increases the number of data breaches and identity theft, drives up the costs and impacts the revenue. …”
Get full text
Article -
182
Blockchained Trustable Federated Learning Utilizing Voting Accountability for Malicious Actor Mitigation
Published 2023-05-01“…However, traditional FL schemes still rely on a centralized server, making them vulnerable to security risks, such as data breaches and tampering of models caused by malicious actors attempting to gain access by masquerading as trainers. …”
Get full text
Article -
183
A New System for Surveillance and Digital Contact Tracing for COVID-19: Spatiotemporal Reporting Over Network and GPS
Published 2020-06-01“…However, there are a number of unresolved questions about the use of smartphone data for health surveillance, including how to protect individual privacy and provide safeguards against data breaches.…”
Get full text
Article -
184
A Metamodel for Web Application Security Evaluation
Published 2023-11-01“…Organizations face constant risks associated with vulnerabilities in their web-based software systems, which can result in data breaches, service disruptions, and a loss of trust. …”
Get full text
Article -
185
Botching Human Factors in Cybersecurity in Business Organizations
Published 2018-12-01“…The mounting cyber-attacks, data breaches, and ransomware attacks are a result of human-enabled errors, in fact, 95% of all cyber incidents are human-enabled. …”
Get full text
Article -
186
Infrastructure, Attitude and Weather: Today’s Threats to Supply Chain Security
Published 2016-06-01“…Technology-based threats to supply chains, such as cybercrimes, data breaches and IT failures, now appear more frequently in the literature on supply chain security. …”
Get full text
Article -
187
Parametric study of doubler plate reinforced circular hollow section T-joints at elevated temperature
Published 2015“…Nevertheless, this study seeks to provide an insight on this aspect through the use of empirical data, breaching these gaps and the laying the foundation in which further studies can be built on. …”
Get full text
Final Year Project (FYP) -
188
Applying Blockchain Technology to Security-Related Aspects of Electronic Healthcare Record Infrastructure
Published 2021-12-01“…There has been a rise in the number of data breaches related to EHRs. The infrastructure used by EHRs does not assure the privacy and security of patients’ medical records. …”
Get full text
Article -
189
Cyberattacks and Security of Cloud Computing: A Complete Guideline
Published 2023-10-01“…Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, key exposure, auditing, privacy preservability, and cloud-assisted IoT applications. …”
Get full text
Article -
190
Image Steganography Using LSB and Hybrid Encryption Algorithms
Published 2023-10-01“…In today’s era of widespread web technology and cloud computing, ensuring data security has become a crucial concern across various industries. Instances of data breaches and vulnerabilities in cloud storage have emphasized the need for robust data protection and communication protocols, particularly in sectors like social media, military, and research. …”
Get full text
Article -
191
A Systematic Literature Review of Information Security in Chatbots
Published 2023-05-01“…The review finds that chatbots face various security threats, including malicious input, user profiling, contextual attacks, and data breaches, and that solutions such as blockchain technology, end-to-end encryption, and organizational controls can be used to mitigate these concerns. …”
Get full text
Article -
192
Provenance graph generation for intrusion detection
Published 2023“…Consequently, commercial IDSs may fail to detect intrusions for extended periods, leading to substantial financial losses and data breaches for organizations. Provenance graphs are directed graphs that documents the lineage and history of data, and their associated activities. …”
Get full text
Final Year Project (FYP) -
193
Setting a disordered password on a photonic memory
Published 2018“…However, we wish to address the intrinsic risk of data breaches in existing schemes of photonic memory. …”
Get full text
Get full text
Journal Article -
194
The Application of Blockchain in Social Media: A Systematic Literature Review
Published 2022-06-01“…However, there are many limitations to the use of social media, such as misinformation, lack of effective content moderation, digital piracy, data breaches, identity fraud, and fake news. In order to address these limitations, several studies have introduced the application of Blockchain technology in social media. …”
Get full text
Article -
195
An efficient chain code for access control in hyper ledger fabric healthcare system
Published 2023-09-01“…However, the use of EHRs by healthcare practitioners creates the risk of data breaches and jeopardizes patient confidentiality. …”
Get full text
Article -
196
Designing a Governance System for Cybersecurity of Foreign Investment in Europe
Published 2023-07-01“…In the last years, the most frequent (documented) cyber-threats have been: malware; phishing attacks; spam; denial of service; ransomware; insider threat; data breaches; information leakage; cryptojacking and cyber espionage. …”
Get full text
Article -
197
Cyber Literacy Skills of Estonians: Activities and Policies For Encouraging Knowledge-Based Cyber Security Attitudes
Published 2023-05-01“…A human error is a central target of cyber attacks, phishing scams, and data breaches. Cyber criminals are becoming more and more inventive. …”
Get full text
Article -
198
Promise and Provisos of Artificial Intelligence and Machine Learning in Healthcare
Published 2022-07-01“…Reliability of input data, interpretation of output data, data proprietorship, consumer privacy, and liability issues due to potential for data breaches will all have to be addressed. Of equal concern will be decreased human interaction in clinical care, patient satisfaction, affordability, and skepticism regarding cost-benefit. …”
Get full text
Article -
199
Enhancing User Data Privacy and Trust through the Implementation of the OTrace Protocol: Development, Challenges, and Impact Assessment
Published 2024“…In the digital age, safeguarding user data privacy and rebuilding trust in digital platforms have become critical priorities as data breaches and misuse continue to rise. This thesis ex- plores the novel traceability and accountability protocol - OTrace, which tackles these issues by providing users with enhanced control and transparency over their personal data through advanced consent mechanisms and data traceability features. …”
Get full text
Thesis -
200
Diagnostic of Data Processing by Brazilian Organizations—A Low Compliance Issue
Published 2021-04-01“…In addition, our findings also revealed that 16.3% of organizations have not established a procedure or methodology to verify that the LGPD principles are being respected during the development of services that will handle personal data from the product or service design phase to its execution and 20% of the organizations did not establish a communication process to the personal data holders, regarding the possible data breaches. The result of the diagnostic allows organizations and data users to have an overview of how the treatment of personal data of their customers is being treated and which points of attention are in relation to the principles of LGPD.…”
Get full text
Article