Attention-GAN for Anomaly Detection: A Cutting-Edge Approach to Cybersecurity Threat Management

MA Sen - arXiv preprint arXiv:2402.15945, 2024 - arxiv.org
This paper proposes an innovative Attention-GAN framework for enhancing cybersecurity,
focusing on anomaly detection. In response to the challenges posed by the constantly …

Lightweight Cryptography for Internet of Things: A Review

CP Ekwueme, IH Adam, A Dwivedi - … Endorsed Transactions on …, 2024 - publications.eai.eu
The paper examines the rising significance of security in Internet of Things (IoT) applications
and emphasizes the need for lightweight cryptographic solutions to protect IoT devices. It …

Machines and Equipment for Pseudocereal Processing

ND Patil, P Chawla - Pseudocereals, 2024 - taylorfrancis.com
This abstract provides an overview of the role of machinery in the processing of
pseudocereals, such as quinoa, amaranth, and buckwheat. Pseudocereals have gained …

Navigating Data Secrecy Challenges: A Study on Cyberespionage Intentions in the WFH Era

IH Abu Samah, A Sarip, MK Ishak, R Shaari… - Journal of The Institution …, 2024 - Springer
In the contemporary landscape of remote work, the surge in cyberespionage poses
unprecedented challenges to data secrecy. As organizations transition toward a work-from …

Comparative Analysis of Encryption and Decryption for Securing Environmental Sector Telemetry Data

A Abdullah, N Hafeez, A Ur Rehman… - … of Computing and …, 2024 - journals.uob.edu.bh
This work investigates the encryption and decoding strategies for getting ecological sensor
telemetry information. The review assesses both symmetric and awry encryption calculations …

Secure Data Transmission in the Era of 6G: Challenges and Solutions

P Janay, A Sarkara - Algorithm Asynchronous, 2023 - hasmed.org
A new age of wireless communication marked by unheard-of data speeds and connection is
introduced by sixth-generation (6G) networks. This study focuses on problems and solutions …

Organizational and Social Factor Analysis: The Role of Human Resources in the Success of Information Security Systems in the Digital Business Context

B Sunarso - Technology and Society …, 2024 - journal.literasisainsnusantara.com
In the continually evolving digital business era, information security has become paramount
for organizations to ensure the continuity of their operations. Information security systems …

Architectural Insights into TRUSTEE's Authentication Manager: Leveraging SSI and eIDAS

A Grammatopoulos, I Stylianou… - 2023 IEEE 28th …, 2023 - ieeexplore.ieee.org
In today's digital realm, secure and effective user authentication mechanisms are of
paramount importance. This paper delves into the intricate architecture of the Authentication …

CyberSecurity Education for Industry and Academia (CSE4IA 2024)

VS Barletta, F Caruso, T Di Mascio, F Greco… - Proceedings of the …, 2024 - dl.acm.org
The cybersecurity domain faces a critical disparity between the escalating demand for
skilled professionals and the limited talent pool. This gap is primarily driven by the surge in …

Exploring Resilient Operation of Multi-Robot Fleet in Various Attack Scenarios

A Papanikolaou, I Sotiropoulos, S Rizou… - … on Control and …, 2024 - ieeexplore.ieee.org
In the era of autonomous robotics and the pro-liferation of robot fleets, the reliability of these
systems in the face of potential disruptions becomes a critical consideration. This paper …