|
|
|
Shaukat Ali, Naveed Islam, Azhar Rauf, Ikram Ud Din, Mohsen Guizani and Joel J. P. C. Rodrigues
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with oth...
ver más
|
|
|
|
|
|
|
Shaukat Ali, Naveed Islam, Azhar Rauf, Ikram Ud Din, Mohsen Guizani and Joel J. P. C. Rodrigues
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with oth...
ver más
|
|
|
|
|
|
|
Thomas Hayes,Margaret Tanner,George Schmidt
Pág. 107 - 112
This paper investigates the possible existence of overconfidence by small business professionals in their knowledge of different types of computer security threats. Specifically, this article focuses on the ability of small business owners and managers t...
ver más
|
|
|
|
|
|
|
Thomas Hayes,Margaret Tanner,George Schmidt
Pág. 107 - 112
This paper investigates the possible existence of overconfidence by small business professionals in their knowledge of different types of computer security threats. Specifically, this article focuses on the ability of small business owners and managers t...
ver más
|
|
|
|
|
|
|
Poornima Mahadevappa, Redhwan Al-amri, Gamal Alkawsi, Ammar Ahmed Alkahtani, Mohammed Fahad Alghenaim and Mohammed Alsamman
Edge data analytics refers to processing near data sources at the edge of the network to reduce delays in data transmission and, consequently, enable real-time interactions. However, data analytics at the edge introduces numerous security risks that can ...
ver más
|
|
|
|
|
|
|
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac...
ver más
|
|
|
|
|
|
|
Vasiliki Demertzi, Stavros Demertzis and Konstantinos Demertzis
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancements have had a profound impact on the structures of numerous industrial o...
ver más
|
|
|
|
|
|
|
Omar Flor-Unda, Freddy Simbaña, Xavier Larriva-Novo, Ángel Acuña, Rolando Tipán and Patricia Acosta-Vargas
Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that affect public and private services a...
ver más
|
|
|
|
|
|
|
Naning Fatmawatie
Pág. 101 - 112
AbstractionThe success of economic development has indicators of economic factors and non-economic factors. The impact of the corona has made the Indonesian economy slump. The business world in various sectors, including trade, industry, and services, ha...
ver más
|
|
|
|
|
|
|
Jorge Bautista-Hernández and María Ángeles Martín-Prats
Cybersecurity plays a relevant role in the new digital age within the aerospace industry. Predictive algorithms are necessary to interconnect complex systems within the cyberspace. In this context, where security protocols do not apply, challenges to mai...
ver más
|
|
|
|
|
|
|
Mikael Palmén, Ajda Lotric, Aleksi Laakso, Victor Bolbot, Mia Elg and Osiris A. Valdez Banda
Interest in more sustainable energy sources has increased rapidly in the maritime industry, and ambitious goals have been set for decreasing ship emissions. All industry stakeholders have reacted to this with different approaches including the optimisati...
ver más
|
|
|
|
|
|
|
Monika Mysliwy and Vladimir Pe?ic
River valleys are known to be of high natural value; however, they are exposed to a strong human influence. Anthropogenic changes are evident in the structure and species composition of plant assemblages; therefore, vegetation is a very good indicator of...
ver más
|
|
|
|
|
|
|
Fumin Zou, Chenxi Xia, Feng Guo, Xinjian Cai, Qiqin Cai, Guanghao Luo and Ting Ye
Due to the challenge of limited line of sight in the perception system of intelligent driving vehicles (cameras, radar, body sensors, etc.), which can only perceive threats within a limited range, potential threats outside the line of sight cannot be fed...
ver más
|
|
|
|
|
|
|
Ziyad R. Alashhab, Mohammed Anbar, Manmeet Mahinderjit Singh, Iznan H. Hasbullah, Prateek Jain and Taief Alaa Al-Amiedy
Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new services and computing resources at a fraction of the costs for end-users than traditional com...
ver más
|
|
|
|
|
|
|
Yuan Luo, Jiakai Lu, Yi Zhang, Qiong Qin and Yanyu Liu
This research can be applied to path planning and automatic obstacle avoidance of drone in low altitude complex environments.
|
|
|
|
|
|
|
Zhizhou Gao, Lujun Wan, Ming Cai and Xinyu Xu
This research can be applied to route planning in a complex threat environment.
|
|
|
|
|
|
|
Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, Evgeny Abramov and Anatoly Basyuk
The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main modules: a data acquisition module for data processing and a normalization module. One of the main features of an adaptive UAV protection system is the analysis of its cybe...
ver más
|
|
|
|
|
|
|
Sungchae Park and Heung-Youl Youm
As COVID-19 became a pandemic worldwide, contact tracing technologies and information systems were developed for quick control of infectious diseases in both the private and public sectors. This study aims to strengthen the data subject?s security, priva...
ver más
|
|
|
|
|
|
|
Ramraj Dangi, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra and Praveen Lalwani
Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broadband...
ver más
|
|
|
|
|
|
|
Sezgin Özden, Taner Okan, Seda Erkan Bugday and Coskun Köse
In the Kozak Basin, which is the most important pine nut production and trade center in Turkey, there has been a significant decrease in production recently. In this study, the perspectives of the farmers in this area were investigated, specifically abou...
ver más
|
|
|
|