Traditional survey systems struggle with data immutability, privacy protection, and reliable storage. these limitations compromise transparency, security, and data integrity. this paper proposes a decentralized and se...
详细信息
Ensuring data integrity and security has become integral in the digital era. Blockchain, an immutable ledger can be leveraged to provide data integrity to the cloud system. Centralised cloud systems present challenges...
详细信息
Edge computing has transformed technology by enabling seamless connections between IoT devices, but it also introduces significant security challenges. EC is crucial for providing minimal latency processing and reduci...
详细信息
Object recognition in UAV images is very challenging due to the frequent appearance of numerous small and truncated entities. Object detection is an essential component of computer vision for accurate object localizat...
详细信息
Hardware Trojan is a major vulnerability in the security of the system. Various researchers have worked on the hardware Trojan detection and prevention techniques as solutions that are based on traditional methods suc...
详细信息
the Internet of things integrate various electronics devices on common platform as objects over the Internet. IoT devices have limited capabilities, such as low power, less memory, and low computational processing. Be...
详细信息
Nowadays, healthcare systems face ever-increasing cyber securitythreats due to the sensitive nature of patient data and the proliferation of IoT-enabled medical devices. Traditional Intrusion Detection Systems (IDS) ...
详细信息
this project demonstrates a low-cost anti-theft solution built around the ESP32-WROOM microcontroller, with integrated chemical spray for security. the system is designed to detect unauthorized entry and respond with ...
详细信息
the proceedings contains 14 papers of the conference on Proceedings of the acm Workshop On Survivable and Self-Regenerative Systems (In Association With 10thacmconference On computercommunicationsecurity). the top...
详细信息
ISBN:
(纸本)1581137842
the proceedings contains 14 papers of the conference on Proceedings of the acm Workshop On Survivable and Self-Regenerative Systems (In Association With 10thacmconference On computercommunicationsecurity). the topics include: a churn-resistant peer-to-peer web caching system;a holistic approach to service survivability;security analysis of SITAR intrusion tolerant system;continual repair for windows using the event log and self-regressive software components.
CryptBot, an infostealer malware first identified in 2019, poses a serious threat by stealing sensitive data, including login credentials and cryptocurrency wallet details, and transmitting them to command-and-control...
详细信息
暂无评论