Opportunities of the technological trends linked to Industry 4.0 for achieve sustainable manufacturing objectives

G Fuertes, J Zamorano, M Alfaro, M Vargas, J Sabattin… - Sustainability, 2022 - mdpi.com
In this work, we integrate the concepts of Industry 4.0, smart manufacturing, and sustainable
manufacturing in a model that provides a conceptual framework for the study of long-term …

Secure Email Transmission Protocols--A New Architecture Design

G Chen, R Wanner - arXiv preprint arXiv:2208.00388, 2022 - arxiv.org
During today's digital age, emails have become a crucial part of communications for both
personal and enterprise usage. However, email transmission protocols were not designed …

Advanced BERT and CNN-Based Computational Model for Phishing Detection in Enterprise Systems.

BB Gupta, A Gaurav, V Arya, RW Attar… - … in Engineering & …, 2024 - search.ebscohost.com
Phishing attacks present a serious threat to enterprise systems, requiring advanced
detection techniques to protect sensitive data. This study introduces a phishing email …

Adaptive Security Policy Modeling for Intelligent Financial Systems

Y Xiong, H Bu - 2024 8th International Conference on I-SMAC …, 2024 - ieeexplore.ieee.org
This study addresses the development and the evaluation of an adaptive security policy
model for intelligent financial systems. The primary goal is to establish a dynamic and …

[PDF][PDF] Analisis Kesadaran Mahasiswa Terhadap Bahaya Cybercrime Di Media Sosial

IH Ramadhan, EK Nurnawati - JTKSI (Jurnal Teknologi Komputer …, 2023 - academia.edu
Mahasiswa merupakan salah satu pengguna teknologi dan internet terbesar di Indonesia.
Hal tersebut dikarenakan kebutuhan teknologi dan internet untuk menunjang …

Multi-platform Process Flow Models and Algorithms for Extraction and Documentation of Digital Forensic Evidence from Mobile Devices

GG Ocen, O Bongomin, GB Mugeni, MS Makau… - arXiv preprint arXiv …, 2022 - arxiv.org
The increasing need for the examination of evidence from mobile and portable gadgets
increases the essential need to establish dependable measures for the investigation of …

[PDF][PDF] AI-Driven Defense Mechanisms for Protecting Industry 5.0 from Android Malware Threats

CS Dash - researchgate.net
This study seeks to establish the level of accuracy of CNN, RNN, and GNN in the
classification of Android malware threats in industrial 5. 0 applications. To notice the …