[HTML][HTML] A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments
Intentional electromagnetic interference attacks (eg, jamming) against wireless connected
devices such as the Internet of Things (IoT) remain a serious challenge, especially as such …
devices such as the Internet of Things (IoT) remain a serious challenge, especially as such …
[PDF][PDF] Leveraging Generative Artificial Intelligence (AI) for cybersecurity: Analyzing diffusion models in detecting and mitigating cyber threats
AR Akinyele, OO Ajayi, G Munyaneza… - GSC Advanced …, 2024 - researchgate.net
Due to the increased number of cyber dangers in today's digitally connected world, more
advanced and flexible security measures have had to be created. Using generative artificial …
advanced and flexible security measures have had to be created. Using generative artificial …
[HTML][HTML] Intelligent Fault Diagnosis of Planetary Gearbox Across Conditions Based on Subdomain Distribution Adversarial Adaptation
S Han, Z Feng, Y Zhang, M Du, Y Yang - Sensors, 2024 - mdpi.com
Sensory data are the basis for the intelligent health state awareness of planetary gearboxes,
which are the critical components of electromechanical systems. Despite the advantages of …
which are the critical components of electromechanical systems. Despite the advantages of …
[HTML][HTML] Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data
M Naseer, F Ullah, S Ijaz, H Naeem… - Sensors (Basel …, 2025 - pmc.ncbi.nlm.nih.gov
Android malware detection remains a critical issue for mobile security. Cybercriminals target
Android since it is the most popular smartphone operating system (OS). Malware detection …
Android since it is the most popular smartphone operating system (OS). Malware detection …
[PDF][PDF] An expert system of recommendations for combating cyber threats using CVSS metrics and game theory
МВ Міщенко, МС Дорош - Вісник сучасних інформаційних технологій, 2024 - hait.od.ua
This study is focused on the creation of an expert system for generating recommendations
on cyber security. The developed expert system uses a game-theoretic model as a inference …
on cyber security. The developed expert system uses a game-theoretic model as a inference …
[PDF][PDF] Data Privacy and Security in E-commerce: Utilizing Blockchain and Multi-Factor Authentication to Safeguard Transactions
M Zishan, S Russell - researchgate.net
In the evolving landscape of e-commerce, the protection of data privacy and security has
become paramount due to increasing cyber threats and sophisticated attacks. This abstract …
become paramount due to increasing cyber threats and sophisticated attacks. This abstract …
[PDF][PDF] Building a Future Networks Security Ecosystem: Leveraging Big Data and AI in Cybersecurity for Risk Assessment and Threat Detection
J Linda, M Khan - researchgate.net
In the rapidly evolving landscape of cybersecurity, traditional approaches to risk assessment
and threat detection are increasingly inadequate. The advent of Big Data and Artificial …
and threat detection are increasingly inadequate. The advent of Big Data and Artificial …
Privacy-Aware Federated Learning Framework for Securing Iot Devices Using Chameleon Swarm Algorithm with Self Attentive Variational Autoencoder Model
S Alahmari - Available at SSRN 4966315 - papers.ssrn.com
Abstract The Internet of Things (IoT) is revolutionizing various applications, but its rapid
growth presents significant security and privacy challenges. IoT systems collect vast …
growth presents significant security and privacy challenges. IoT systems collect vast …