Showing 151 to 160 of 352 articles
Clear Filters
Sensors (Basel, Switzerland)
Jan 12, 2023
Recently, with the massive growth of IoT devices, the attack surfaces have also intensified. Thus, cybersecurity has become a critical component to protect organizational boundaries. In networks, Intrusion Detection Systems (IDSs) are employed to rai...
Sensors (Basel, Switzerland)
Dec 16, 2022
The accelerating transition of traditional industrial processes towards fully automated and intelligent manufacturing is being witnessed in almost all segments. This major adoption of enhanced technology and digitization processes has been originally...
IEEE journal of biomedical and health informatics
Dec 7, 2022
Theabnormal behavior detection is the vital for evaluation of daily-life health status of the patient with cognitive impairment. Previous studies about abnormal behavior detection indicate that convolution neural network (CNN)-based computer vision o...
Sensors (Basel, Switzerland)
Nov 21, 2022
In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provide...
Sensors (Basel, Switzerland)
Nov 15, 2022
Although network management tasks are highly automated using big data and artificial intelligence technologies, when an unforeseen cybersecurity problem or fault scenario occurs, administrators sometimes directly analyze system data to make a heurist...
Sensors (Basel, Switzerland)
Nov 2, 2022
Cybersecurity has been widely used in various applications, such as intelligent industrial systems, homes, personal devices, and cars, and has led to innovative developments that continue to face challenges in solving problems related to security met...
Sensors (Basel, Switzerland)
Oct 21, 2022
Perceptual encryption (PE) of images protects visual information while retaining the intrinsic properties necessary to enable computation in the encryption domain. Block-based PE produces JPEG-compliant images with almost the same compression savings...
Sensors (Basel, Switzerland)
Oct 8, 2022
Advanced Persistent Threat is an attack campaign in which an intruder or team of intruders establishes a long-term presence on a network to mine sensitive data, which becomes more dangerous when combined with polymorphic malware. This type of malware...
Sensors (Basel, Switzerland)
Oct 6, 2022
Body Area Network (BAN) is one of the most important techniques for observing patient health in real time and identifying and analyzing diseases. For effective implementation of this technology in practice and to benefit from it, there are some key i...
Journal of medical Internet research
Sep 20, 2022
BACKGROUND: A Trusted Research Environment (TRE; also known as a Safe Haven) is an environment supported by trained staff and agreed processes (principles and standards), providing access to data for research while protecting patient confidentiality....