AIMC Topic: Computer Security

Clear Filters Showing 11 to 20 of 380 articles

ICN intrusion detection method based on GA-CNN.

PloS one
The current industrial control system network is susceptible to data theft attacks such as SQL injection in practical applications, resulting in data loss or leakage of enterprise secrets. To solve the network intrusion problem faced by industrial co...

Mobile applications for skin cancer detection are vulnerable to physical camera-based adversarial attacks.

Scientific reports
Skin cancer is one of the most prevalent malignant tumors, and early detection is crucial for patient prognosis, leading to the development of mobile applications as screening tools. Recent advances in deep neural networks (DNNs) have accelerated the...

Detecting eavesdropping nodes in the power Internet of Things based on Kolmogorov-Arnold networks.

PloS one
The rapid proliferation of the Power Internet of Things (PIoT) has given rise to severe network security threats, with eavesdropping attacks emerging as a paramount concern. Traditional eavesdropping detection methods struggle to adapt to complex and...

Secure healthcare data sharing and attack detection framework using radial basis neural network.

Scientific reports
Secure medical data sharing and access control play a prominent role. However, it is still unclear how to provide a security architecture that can guarantee the privacy and safety of sensitive medical data. Existing methods are application-specific a...

Heuristically enhanced multi-head attention based recurrent neural network for denial of wallet attacks detection on serverless computing environment.

Scientific reports
Denial of Wallet (DoW) attacks are a cyber threat designed to utilize and deplete an organization's financial resources by generating excessive prices or charges in their cloud computing (CC) and serverless computing platforms. These threats are prim...

AI-driven cybersecurity framework for software development based on the ANN-ISM paradigm.

Scientific reports
With the increasing reliance on software applications, cybersecurity threats have become a critical concern for developers and organizations. The answer to this vulnerability is AI systems, which help us adapt a little better, as traditional measures...

Improved security for IoT-based remote healthcare systems using deep learning with jellyfish search optimization algorithm.

Scientific reports
With an increased chronic disease and an ageing population, remote health monitoring is a substantial method to enhance the care of patients and decrease healthcare expenses. The Internet of Things (IoT) presents a promising solution for remote healt...

Federated learning with differential privacy for breast cancer diagnosis enabling secure data sharing and model integrity.

Scientific reports
In the digital age, privacy preservation is of paramount importance while processing health-related sensitive information. This paper explores the integration of Federated Learning (FL) and Differential Privacy (DP) for breast cancer detection, lever...

Enhancing security in electromagnetic radiation therapy using fuzzy graph theory.

Scientific reports
This research investigates the application of fuzzy graph theory to address critical security challenges in electromagnetic radiation therapy systems. Through comprehensive theoretical analysis and experimental validation, we introduce novel approach...

Ethical implications related to processing of personal data and artificial intelligence in humanitarian crises: a scoping review.

BMC medical ethics
BACKGROUND: Humanitarian organizations are rapidly expanding their use of data in the pursuit of operational gains in effectiveness and efficiency. Ethical risks, particularly from artificial intelligence (AI) data processing, are increasingly recogn...