Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …
due to business dependencies such as communication, virtual meetings, and access to …
Malevolent information crawling mechanism for forming structured illegal organisations in hidden networks
Terrorist groups like ISIS have made considerable use of the dark web (DW) to carry out
their malicious objectives such as spreading propaganda, recruiting and radicalizing new …
their malicious objectives such as spreading propaganda, recruiting and radicalizing new …
Future of Digital Work Force in Robotic Process Automation
Summary Robotic Process Automation (RPA) represents an advance in the state of the art in
terms of technology. Robotic Process Automation (RPA) is one of the most cutting‐edge …
terms of technology. Robotic Process Automation (RPA) is one of the most cutting‐edge …
[BOOK][B] Online Social Networks in Business Frameworks
This book presents a vital method for companies to connect with potential clients
andconsumers in the digital era of Online Social Networks (OSNs), utilizing the strengthof …
andconsumers in the digital era of Online Social Networks (OSNs), utilizing the strengthof …
OSN Traits and Vulnerability for Measurement and Analysis
Online social networks (OSNs) have been immensely popular in the last few years due to
the rapid advancement of technology. The key factor behind this occurrence is OSNs' …
the rapid advancement of technology. The key factor behind this occurrence is OSNs' …
Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art
S Rani, K Tripathi, A Kumar - International Journal on Interactive Design …, 2023 - Springer
In the last decade, the number of computer malware has grown rapidly. Currently,
cybercriminals typically use malicious software (malware) as a means of attacking industrial …
cybercriminals typically use malicious software (malware) as a means of attacking industrial …
Revolutionizing Modern Automated Technology with WEB 3.0
S Shrivastava, AK Tyagi - Robotic Process Automation, 2023 - Wiley Online Library
The web has revolutionised the way modern automated technologies (intelligent
technologies) work. The first version of the web, which was Web 1.0, lasted from 1989 to …
technologies) work. The first version of the web, which was Web 1.0, lasted from 1989 to …
A survey on automated software vulnerability detection using machine learning and deep learning
Software vulnerability detection is critical in software security because it identifies potential
bugs in software systems, enabling immediate remediation and mitigation measures to be …
bugs in software systems, enabling immediate remediation and mitigation measures to be …
Conversational Artificial Intelligence at Industrial Internet of Things
Summary The Internet of Things (IoT), which links physical things or devices to the internet,
is one of the fundamental technologies influencing the future. The system's usefulness and …
is one of the fundamental technologies influencing the future. The system's usefulness and …
Blockchain Based Humans‐Agents Interactions/Human‐Robot Interactions: A Systematic Literature Review and Research Agenda
F Kureshi, D Makwana, U Bodkhe… - Robotic Process …, 2023 - Wiley Online Library
The notion of blockchain has facilitated the creation of smart contracts, cryptocurrencies, and
a multitude of other technological developments. However, apart from its usage in …
a multitude of other technological developments. However, apart from its usage in …