Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security
This survey paper explores the transformative role of Artificial Intelligence (AI) in information
security. Traditional methods, especially rule-based approaches, faced significant …
security. Traditional methods, especially rule-based approaches, faced significant …
[HTML][HTML] The personal health applications of machine learning techniques in the internet of behaviors
With the swift pace of the development of artificial intelligence (AI) in diverse spheres, the
medical and healthcare fields are utilizing machine learning (ML) methodologies in …
medical and healthcare fields are utilizing machine learning (ML) methodologies in …
Safeguarding Individuals and Organisations from Privacy Breaches: A Comprehensive Review of Problem Domains, Solution Strategies, and Prospective Research …
Privacy breaches have become increasingly prevalent, exposing individuals to significant
risks. These breaches can have far-reaching consequences, including identity theft and life …
risks. These breaches can have far-reaching consequences, including identity theft and life …
Development of a smart tourism service system based on the Internet of Things and machine learning
H Ma - The Journal of Supercomputing, 2024 - Springer
While traveling, people need to utilize smart tourism service systems based on the Internet of
Things (IoT) to enhance their journeys' convenience. However, existing IoT-based smart …
Things (IoT) to enhance their journeys' convenience. However, existing IoT-based smart …
Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach
F Azzedin - IEEE Access, 2023 - ieeexplore.ieee.org
In domains such as telehealth, intelligent transportation, and autonomous agriculture,
ensuring secure routing of collected and exchanged data is paramount. Since its inception …
ensuring secure routing of collected and exchanged data is paramount. Since its inception …
Leveraging NLP techniques for privacy requirements engineering in user stories
Privacy requirements engineering acts as a role to systematically elicit privacy requirements
from system requirements and legal requirements such as the GDPR. Many methodologies …
from system requirements and legal requirements such as the GDPR. Many methodologies …
Swarmtrust: A swarm optimization-based approach to enhance trustworthiness in smart homes
As smart home networks become increasingly complex and dynamic, maintaining trust
between the various devices and services is crucial. Existing trust management approaches …
between the various devices and services is crucial. Existing trust management approaches …
Current applications and challenges of the Internet of Things
R Dallaev, T Pisarenko, Ş Ţălu… - New Trends in …, 2023 - journals.vilniustech.lt
The concept of the Internet of Things is capable of making a giant leap in the economy,
including research in the field of computer science, network technologies, microelectronics …
including research in the field of computer science, network technologies, microelectronics …
Towards a Holistic Privacy Requirements Engineering Process: Insights from a Systematic Literature Review
Privacy requirements engineering is a crucial aspect of privacy engineering. It aims to
integrate privacy principles into organizational and technical processes throughout the …
integrate privacy principles into organizational and technical processes throughout the …
Protecting data and privacy: cloud-based solutions for intelligent transportation applications
The interaction between transportation networks and intelligent transportation systems has
been revolutionized by cloud computing. However, the reliance on cloud-based solutions …
been revolutionized by cloud computing. However, the reliance on cloud-based solutions …