A taxonomy on smart healthcare technologies: Security framework, case study, and future directions
There is a massive transformation in the traditional healthcare system from the specialist‐
centric approach to the patient‐centric approach by adopting modern and intelligent …
centric approach to the patient‐centric approach by adopting modern and intelligent …
Protective factors for develo** cognitive skills against cyberattacks
Cyberattacks capitalize on human behaviors. The prevalence of cyberattacks surged during
the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online …
the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online …
[HTML][HTML] Digital forensic of Maze ransomware: A case of electricity distributor enterprise in ASEAN
Due to the Coronavirus pandemic (COVID-19) throughout 2020–22, remote working has
played an important part in organizations, businesses, and agencies worldwide. This …
played an important part in organizations, businesses, and agencies worldwide. This …
Machine Learning For Detecting Credit Card Fraud
These days frauds related to credit cards are exponentially increasing as compared to
earlier scenarios. Like every coin has two faces in a similar way where on one hand the …
earlier scenarios. Like every coin has two faces in a similar way where on one hand the …
An investigation into how smartphones can be secured against MiTM attacks: financial sector
D Steiner-Otoo, H Jahankhani - Blockchain and other emerging …, 2022 - Springer
MiTM attack aims to violate data in transmission through the air medium in a wireless
network; MITM exploits compromise data confidentiality and integrity and are conceivably …
network; MITM exploits compromise data confidentiality and integrity and are conceivably …
Inferential statistics and visualisation analysis of automobile industry
A Singhal, K Varshney, N Sharma… - AIP Conference …, 2023 - pubs.aip.org
The manuscript aims to present the analysis and visualization of automobiles using various
visualization tools available in python. Exploratory data analysis is done to gain insights …
visualization tools available in python. Exploratory data analysis is done to gain insights …
Use of Barnes-Hut Algorithm to Attack COVID-19 Virus
R Boughammoura - International Journal on Cybernetics & Informatics …, 2023 - ijcionline.com
The epidemy COVID-19 (khnown as Corona) is very dangerous. China, the epicenter of the
epidemy, is the most infected country tell 07/04/2020 with 81 740 infected, and 3 331 death …
epidemy, is the most infected country tell 07/04/2020 with 81 740 infected, and 3 331 death …
Comparative Analysis of Various Machine Learning Algorithms for Detection of Malware and Benign
S Mohi ud din, F Rizvi, N Sharma… - International Advanced …, 2022 - Springer
The expansion of the cyberspace world has paved the way for numerous attacks and
misuses of online resources and networks. For instance, malware is the prime cause of data …
misuses of online resources and networks. For instance, malware is the prime cause of data …
The use of the ChatGPT language model in the creation of malicious programs
V Ubavić, M Jovanović-Milenković… - BizInfo (Blace) Journal …, 2023 - bizinfo.edu.rs
ChatGPT is a new chatbot developed by the company OpenAI and is an interface for the
language model (Large Language Model). Although its primary function is to mimic a human …
language model (Large Language Model). Although its primary function is to mimic a human …
[PDF][PDF] Study of Lokibot Infection Against Indonesian Network
SR Ariani, R Lumanto - oic-cert.org
In recent years, malware has become the top cybersecurity threat. Of the many types of
malware that need attention is malware that causes data leakage, one of which is Lokibot. In …
malware that need attention is malware that causes data leakage, one of which is Lokibot. In …