Zobrazeno 1 - 10
of 4 147
pro vyhledávání: '"Security and privacy"'
Publikováno v:
Jisuanji kexue yu tansuo, Vol 18, Iss 9, Pp 2293-2325 (2024)
Artificial intelligence generated content (AIGC) models have attracted widespread attention and application worldwide due to their excellent content generation capabilities. However, the rapid development of AIGC large models also brings a series of
Externí odkaz:
https://doaj.org/article/baab6cd638874c29aae65b105f1d5eef
Publikováno v:
IET Smart Grid, Vol 7, Iss 4, Pp 370-385 (2024)
Abstract The role of cybersecurity in cyber‐physical power systems (CPPS) is reviewed, focusing on the applications of dynamic state estimation (DSE) techniques. These DSE techniques are particularly relevant with the integration of phasor measurem
Externí odkaz:
https://doaj.org/article/b87a2c840a354b1783c07472862db07a
Autor:
Md. Mokhlesur Rahman, Ravie Chandren Muniyandi, Shahnorbanun Sahran, Opeyemi Lateef Usman, Md. Moniruzzaman
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-21 (2024)
Abstract The timely identification of autism spectrum disorder (ASD) in children is imperative to prevent potential challenges as they grow. When sharing data related to autism for an accurate diagnosis, safeguarding its security and privacy is a par
Externí odkaz:
https://doaj.org/article/bfecf38711b841cb887481aef42aac81
We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. This is a rational solution to an ol
Externí odkaz:
http://arxiv.org/abs/2301.12060
Publikováno v:
South African Journal of Information Management, Vol 26, Iss 1, Pp e1-e11 (2024)
Background: Smart cities leverage advanced technologies such as the Internet of Things (IoT), fifth generation (5G) networks, and data analytics to enhance citizens’ quality of life, focussing on creating efficient, functional, and eco-friendly urb
Externí odkaz:
https://doaj.org/article/0f8d842c2d88440cad128c13e03982cd
Publikováno v:
IET Smart Grid, Vol 7, Iss 1, Pp 13-27 (2024)
Abstract Traditional power systems have evolved into cyber‐physical power systems (CPPS) with the integration of information and communication technologies. CPPS can be considered as a typical hierarchical control system that can be divided into tw
Externí odkaz:
https://doaj.org/article/ad3dc91bc38a49149aff9fa77e50b6df
Autor:
Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Negin Shariati, Daniel Franklin, Massimo Piccardi
Publikováno v:
IEEE Access, Vol 12, Pp 116740-116770 (2024)
The current age is witnessing an unprecedented dependence on data originating from humans through the devices that comprise the Internet of Things. The data collected by these devices are used for many purposes, including predictive maintenance, smar
Externí odkaz:
https://doaj.org/article/030ae488d5674961b6793bb0aeead6f4
Autor:
Mohammad Kamrul Hasan, Zhou Weichen, Nurhizam Safie, Fatima Rayan Awad Ahmed, Taher M. Ghazal
Publikováno v:
IEEE Access, Vol 12, Pp 61642-61666 (2024)
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and network communication technology to establish ubiquitous connectivity among people, machines, and objects. Due to its end devices’ limited computing resources
Externí odkaz:
https://doaj.org/article/e68578acc20541f9915242070eecd9d2
Autor:
Abdu Salam, Mohammad Abrar, Farhan Amin, Faizan Ullah, Izaz Ahmad Khan, Bader Fahad Alkhamees, Hussain AlSalman
Publikováno v:
IEEE Access, Vol 12, Pp 36346-36360 (2024)
In the rapidly advancing domain of smart manufacturing, securing data integrity and preventing unauthorized access are critical challenges. This study introduces a novel approach that synergizes anomaly detection techniques with Zero-Knowledge Proofs
Externí odkaz:
https://doaj.org/article/1e3cbd8d94fa4f038270dbe31c8a6fb1
Publikováno v:
IEEE Access, Vol 12, Pp 15684-15695 (2024)
The application of machine learning in healthcare, financial, social media, and other sensitive sectors not only involves high accuracy but privacy as well. Due to the emergence of the Cloud as a computation and one-to-many access paradigm; training
Externí odkaz:
https://doaj.org/article/503e72ca482f4492baa13e4ac604e156