Attention-GAN for Anomaly Detection: A Cutting-Edge Approach to Cybersecurity Threat Management
MA Sen - arXiv preprint arXiv:2402.15945, 2024 - arxiv.org
This paper proposes an innovative Attention-GAN framework for enhancing cybersecurity,
focusing on anomaly detection. In response to the challenges posed by the constantly …
focusing on anomaly detection. In response to the challenges posed by the constantly …
Lightweight Cryptography for Internet of Things: A Review
CP Ekwueme, IH Adam, A Dwivedi - … Endorsed Transactions on …, 2024 - publications.eai.eu
The paper examines the rising significance of security in Internet of Things (IoT) applications
and emphasizes the need for lightweight cryptographic solutions to protect IoT devices. It …
and emphasizes the need for lightweight cryptographic solutions to protect IoT devices. It …
Machines and Equipment for Pseudocereal Processing
This abstract provides an overview of the role of machinery in the processing of
pseudocereals, such as quinoa, amaranth, and buckwheat. Pseudocereals have gained …
pseudocereals, such as quinoa, amaranth, and buckwheat. Pseudocereals have gained …
Navigating Data Secrecy Challenges: A Study on Cyberespionage Intentions in the WFH Era
In the contemporary landscape of remote work, the surge in cyberespionage poses
unprecedented challenges to data secrecy. As organizations transition toward a work-from …
unprecedented challenges to data secrecy. As organizations transition toward a work-from …
Comparative Analysis of Encryption and Decryption for Securing Environmental Sector Telemetry Data
A Abdullah, N Hafeez, A Ur Rehman… - … of Computing and …, 2024 - journals.uob.edu.bh
This work investigates the encryption and decoding strategies for getting ecological sensor
telemetry information. The review assesses both symmetric and awry encryption calculations …
telemetry information. The review assesses both symmetric and awry encryption calculations …
Secure Data Transmission in the Era of 6G: Challenges and Solutions
P Janay, A Sarkara - Algorithm Asynchronous, 2023 - hasmed.org
A new age of wireless communication marked by unheard-of data speeds and connection is
introduced by sixth-generation (6G) networks. This study focuses on problems and solutions …
introduced by sixth-generation (6G) networks. This study focuses on problems and solutions …
Organizational and Social Factor Analysis: The Role of Human Resources in the Success of Information Security Systems in the Digital Business Context
B Sunarso - Technology and Society …, 2024 - journal.literasisainsnusantara.com
In the continually evolving digital business era, information security has become paramount
for organizations to ensure the continuity of their operations. Information security systems …
for organizations to ensure the continuity of their operations. Information security systems …
Architectural Insights into TRUSTEE's Authentication Manager: Leveraging SSI and eIDAS
A Grammatopoulos, I Stylianou… - 2023 IEEE 28th …, 2023 - ieeexplore.ieee.org
In today's digital realm, secure and effective user authentication mechanisms are of
paramount importance. This paper delves into the intricate architecture of the Authentication …
paramount importance. This paper delves into the intricate architecture of the Authentication …
CyberSecurity Education for Industry and Academia (CSE4IA 2024)
The cybersecurity domain faces a critical disparity between the escalating demand for
skilled professionals and the limited talent pool. This gap is primarily driven by the surge in …
skilled professionals and the limited talent pool. This gap is primarily driven by the surge in …
Exploring Resilient Operation of Multi-Robot Fleet in Various Attack Scenarios
A Papanikolaou, I Sotiropoulos, S Rizou… - … on Control and …, 2024 - ieeexplore.ieee.org
In the era of autonomous robotics and the pro-liferation of robot fleets, the reliability of these
systems in the face of potential disruptions becomes a critical consideration. This paper …
systems in the face of potential disruptions becomes a critical consideration. This paper …