-
81
Fast anomalous traffic detection system for secure vehicular communications
Published 2024-12-01“…These models were carefully assessed on the Car-Hacking-2018 dataset, which simulates real-time vehicular communication scenarios. …”
Get full text
Article -
82
PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
Published 2024-05-01“…Taking into consideration the proliferation of illegal activities against personal information, confidential data or access credentials, especially the commercialization, especially in Dark Web, of codes, passwords, hacking tools, malware and other present or future cutting-edge system interference technologies, thus posing a great danger to the whole cyber-ecosystem, an improvement of art. 6, and of all the correspondent (related) articles in the special laws or the criminal codes adopted by the signatory countries, would contribute to the creation of an extensive and much comprehensive legal tool in the prevention and efficiently combating cybercrimes.…”
Get full text
Article -
83
A Multiscale Structural Analysis of Soft and Hard Coal Deposits in Deep High-Gas Coal Seams
Published 2021-01-01“…The pores were found to be more developed, with the edge of pores being mainly hackly. At the same time, fractures were also relatively developed, showing good connectivity. (3) From a micropore structural perspective, it was found that the BET-specific surface areas and BJH-specific surface areas of the soft coal specimens were higher than those of the hard coal specimens, which indicated that the gas adsorption and diffusion migration abilities of the soft coal were greater than those of the hard coal. (4) It was suggested from the study results that the ventilation and gas extraction processes should be strengthened in the mining activities of coal seams with high, soft stratification content. …”
Get full text
Article -
84
Cyber security laws and safety in e-commerce in India
Published 2023-06-01“…The Indian Penal Code addresses unauthorized access, hacking, identity theft, phishing, and computer virus dissemination. …”
Get full text
Article -
85
2D physically unclonable functions of the arbiter type
Published 2023-03-01“…The use of various basic elements makes it possible to improve the main characteristics of APUF, as well as to break the regularity of their structure, which was the main reason for hacking APUF through machine learning. Conclusion. …”
Get full text
Article -
86
Adoption of Electronic Records Management System in Managing Patients Records at Kabale Regional Referral Hospital.
Published 2024“…Participants gave the challenges as low service quality due to lack of qualified staff, followed by inadequate knowledge, Lack of security and privacy, technological changes, unstable power supply, additional operating costs, computer viruses, and lastly information hacking and misuse Possible ways of improving electronic records in Kabale Regional Referral Hospital were installation of anti virus soft wares which was ranked highly by the Participants followed by regular change of passwords, using only trained personnel, Restrictions on access to records, have stable power supply, Records be maintained in its Cycle, have a backup system and more workshops be provided to all records keepers at Kabale RRH for proper maintenance of records. then finally the study recommended that there is need for the hospital to increase its training programs or workshops in electronic records keeping to the record managers, recruit trained personnel and the records and information keeping department should keep viruses monitoring soft ware's updated…”
Get full text
Thesis -
87
Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Data from the device can be hacked and modified by hackers. By implementing encryption algorithms on Bluetooth Low Energy devices it can guarantee data confidentiality aspects and can prevent hackers from eavesdropping and stealing data. …”
Get full text
Article -
88
”Det var som att hugga med machete i början – nu förfinar vi” – En studie av Samverkan för bästa skola som styrningsteknologi
Published 2024-12-01“…ENGLISH ABSTRACT “It was like hacking with a machete in the beginning – now we are refining it” – A study of Collaboration for Best School as a governance technology The purpose of this article is to discuss how the state intervention Collaboration for the Best School (CBS) governs principals in Swedish compulsory schools. …”
Get full text
Article -
89
Blockchain-Based Value-Added Tax System: A Systematic Review
Published 2024-06-01“…By identifying existing challenges in electronic invoices, such as transaction forgery, the long process of issuing electronic invoices, and hacking of the central database, blockchain technology, with its features like decentralization, tamper-proofness, transparency, and automation, emerges as a suitable solution. …”
Get full text
Article -
90
Analisis Perilaku Entitas untuk Pendeteksian Serangan Internal Menggunakan Kombinasi Model Prediksi Memori dan Metode PCA
Published 2023-12-01“…Abstract Compared to other countries in the world, the level of cyber resilience in Indonesia is low as evidenced by the number of cybercrimes that occur, such as data and identity theft, fraud, and hacking of websites of government and private institutions that involve full or partial insider roles. …”
Get full text
Article -
91