Opportunities of the technological trends linked to Industry 4.0 for achieve sustainable manufacturing objectives
In this work, we integrate the concepts of Industry 4.0, smart manufacturing, and sustainable
manufacturing in a model that provides a conceptual framework for the study of long-term …
manufacturing in a model that provides a conceptual framework for the study of long-term …
Secure Email Transmission Protocols--A New Architecture Design
G Chen, R Wanner - arXiv preprint arXiv:2208.00388, 2022 - arxiv.org
During today's digital age, emails have become a crucial part of communications for both
personal and enterprise usage. However, email transmission protocols were not designed …
personal and enterprise usage. However, email transmission protocols were not designed …
Advanced BERT and CNN-Based Computational Model for Phishing Detection in Enterprise Systems.
BB Gupta, A Gaurav, V Arya, RW Attar… - … in Engineering & …, 2024 - search.ebscohost.com
Phishing attacks present a serious threat to enterprise systems, requiring advanced
detection techniques to protect sensitive data. This study introduces a phishing email …
detection techniques to protect sensitive data. This study introduces a phishing email …
Adaptive Security Policy Modeling for Intelligent Financial Systems
Y Xiong, H Bu - 2024 8th International Conference on I-SMAC …, 2024 - ieeexplore.ieee.org
This study addresses the development and the evaluation of an adaptive security policy
model for intelligent financial systems. The primary goal is to establish a dynamic and …
model for intelligent financial systems. The primary goal is to establish a dynamic and …
[PDF][PDF] Analisis Kesadaran Mahasiswa Terhadap Bahaya Cybercrime Di Media Sosial
IH Ramadhan, EK Nurnawati - JTKSI (Jurnal Teknologi Komputer …, 2023 - academia.edu
Mahasiswa merupakan salah satu pengguna teknologi dan internet terbesar di Indonesia.
Hal tersebut dikarenakan kebutuhan teknologi dan internet untuk menunjang …
Hal tersebut dikarenakan kebutuhan teknologi dan internet untuk menunjang …
Multi-platform Process Flow Models and Algorithms for Extraction and Documentation of Digital Forensic Evidence from Mobile Devices
The increasing need for the examination of evidence from mobile and portable gadgets
increases the essential need to establish dependable measures for the investigation of …
increases the essential need to establish dependable measures for the investigation of …
[PDF][PDF] AI-Driven Defense Mechanisms for Protecting Industry 5.0 from Android Malware Threats
CS Dash - researchgate.net
This study seeks to establish the level of accuracy of CNN, RNN, and GNN in the
classification of Android malware threats in industrial 5. 0 applications. To notice the …
classification of Android malware threats in industrial 5. 0 applications. To notice the …