Zobrazeno 1 - 10
of 571
pro vyhledávání: '"P. Kshetri"'
The increasing integration of artificial intelligence (AI) within cybersecurity has necessitated stronger encryption methods to ensure data security. This paper presents a comparative analysis of symmetric (SE) and asymmetric encryption (AE) algorith
Externí odkaz:
http://arxiv.org/abs/2412.15237
The use of social media applications, hate speech engagement, and public debates among teenagers, primarily by university and college students, is growing day by day. The feelings of tremendous stress, anxiety, and depression via social media among o
Externí odkaz:
http://arxiv.org/abs/2410.20070
The financial sector's dependence on digital infrastructure increases its vulnerability to cybersecurity threats, requiring strong IT security protocols with other entities. This collaboration, however, is often identified as the most vulnerable link
Externí odkaz:
http://arxiv.org/abs/2410.15194
In the current legal environment, it is essential to prioritize the protection and reliability of data to promote trust and effectiveness. This study examines how blockchain technology in the form of blockLAW can be applicable to investigate its effe
Externí odkaz:
http://arxiv.org/abs/2410.06143
In today's digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces 'AssessITS', an actionable method designed to provide o
Externí odkaz:
http://arxiv.org/abs/2410.01750
Autor:
Bhattarai, Uddhav, Sapkota, Ranjan, Kshetri, Safal, Mo, Changki, Whiting, Matthew D., Zhang, Qin, Karkee, Manoj
Global food production depends upon successful pollination, a process that relies on natural and managed pollinators. However, natural pollinators are declining due to different factors, including climate change, habitat loss, and pesticide use. Thus
Externí odkaz:
http://arxiv.org/abs/2409.19918
Social Engineering is the act of manipulating individuals to perform actions or reveal information. Social engineering tactics are widely recognized as a significant risk to information security. The increasing digital environment has increased the p
Externí odkaz:
http://arxiv.org/abs/2408.02092
Several types of cyber-attacks on automobiles and business firms keep on rising as we are preparing to counter cybercrimes with several new technologies and defense models. Cyber defense (also, counter intelligence) is a computer network defense mech
Externí odkaz:
http://arxiv.org/abs/2407.14671
Autor:
Paudel, Achyut, Brown, Jostan, Upadhyaya, Priyanka, Asad, Atif Bilal, Kshetri, Safal, Davidson, Joseph R., Grimm, Cindy, Thompson, Ashley, Sallato, Bernardita, Whiting, Matthew D., Karkee, Manoj
Apple(\textit{Malus domestica} Borkh.) trees are deciduous, shedding leaves each year. This process is preceded by a gradual change in leaf color from green to yellow as chlorophyll is degraded prior to abscission. The initiation and rate of this col
Externí odkaz:
http://arxiv.org/abs/2404.14653
In the ever-evolving healthcare sector, the widespread adoption of Internet of Things and wearable technologies facilitates remote patient monitoring. However, the existing client/server infrastructure poses significant security and privacy challenge
Externí odkaz:
http://arxiv.org/abs/2402.07054