AI Medical Compendium Topic

Explore the latest research on artificial intelligence and machine learning in medicine.

Computer Security

Showing 151 to 160 of 352 articles

Clear Filters

Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System.

Sensors (Basel, Switzerland)
Recently, with the massive growth of IoT devices, the attack surfaces have also intensified. Thus, cybersecurity has become a critical component to protect organizational boundaries. In networks, Intrusion Detection Systems (IDSs) are employed to rai...

Holistic Security and Safety for Factories of the Future.

Sensors (Basel, Switzerland)
The accelerating transition of traditional industrial processes towards fully automated and intelligent manufacturing is being witnessed in almost all segments. This major adoption of enhanced technology and digitization processes has been originally...

Skeleton-Based Abnormal Behavior Detection Using Secure Partitioned Convolutional Neural Network Model.

IEEE journal of biomedical and health informatics
Theabnormal behavior detection is the vital for evaluation of daily-life health status of the patient with cognitive impairment. Previous studies about abnormal behavior detection indicate that convolution neural network (CNN)-based computer vision o...

A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base.

Sensors (Basel, Switzerland)
In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provide...

Multiagent-Based Data Presentation Mechanism for Multifaceted Analysis in Network Management Tasks.

Sensors (Basel, Switzerland)
Although network management tasks are highly automated using big data and artificial intelligence technologies, when an unforeseen cybersecurity problem or fault scenario occurs, administrators sometimes directly analyze system data to make a heurist...

Intrusion Detection in IoT Using Deep Learning.

Sensors (Basel, Switzerland)
Cybersecurity has been widely used in various applications, such as intelligent industrial systems, homes, personal devices, and cars, and has led to innovative developments that continue to face challenges in solving problems related to security met...

IIB-CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning.

Sensors (Basel, Switzerland)
Perceptual encryption (PE) of images protects visual information while retaining the intrinsic properties necessary to enable computation in the encryption domain. Block-based PE produces JPEG-compliant images with almost the same compression savings...

Memory Visualization-Based Malware Detection Technique.

Sensors (Basel, Switzerland)
Advanced Persistent Threat is an attack campaign in which an intruder or team of intruders establishes a long-term presence on a network to mine sensitive data, which becomes more dangerous when combined with polymorphic malware. This type of malware...

Analysis of Security Issues in Wireless Body Area Networks in Heterogeneous Networks.

Sensors (Basel, Switzerland)
Body Area Network (BAN) is one of the most important techniques for observing patient health in real time and identifying and analyzing diseases. For effective implementation of this technology in practice and to benefit from it, there are some key i...

Next-Generation Capabilities in Trusted Research Environments: Interview Study.

Journal of medical Internet research
BACKGROUND: A Trusted Research Environment (TRE; also known as a Safe Haven) is an environment supported by trained staff and agreed processes (principles and standards), providing access to data for research while protecting patient confidentiality....