-
321
Unlocking Cybersecurity: A Game-Changing Framework for Training and Awareness—A Systematic Review
Published 2025-01-01“…However, this increased automation has also escalated cyber threats and attacks alarmingly, as most data breaches are attributed to human errors, which are critical in these incidents. …”
Get full text
Article -
322
Flexible calorimetric differential pressure sensor array integrated with a superhydrophobic surface for flight parameter estimation
Published 2025-07-01“…Utilizing a multilayer perceptron neural network, we demonstrated the function of the sensor array in estimating airspeeds and angle of attacks, achieving average solving errors of 0.15 m/s and 0.37°, respectively.…”
Get full text
Article -
323
Digital Twin Approach for Fault Diagnosis in Photovoltaic Plant DC–DC Converters
Published 2025-07-01“…Fault detection is performed by comparing the real-time system behaviour with DT predictions, using dynamic thresholds based on power, voltage, and current sensors errors. Once a discrepancy is flagged, a second step classifier processes normalized time-series windows to identify the specific fault type. …”
Get full text
Article -
324
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
Published 2025-07-01“…We provide a formal security proof of the proposed scheme under the small-integer solution (SIS) and learning with errors (LWE) within the random oracle model. Theoretical analysis confirms that the scheme achieves security guarantees while maintaining practical feasibility. …”
Get full text
Article -
325
ABA-IDS: Attention-Based Autoencoder for Intrusion Detection in Assistive Mobility Robotic Network
Published 2025-01-01“…Anomaly scores are generated from reconstruction errors, and testing on a benchmark dataset showed that ABA-IDS outperformed existing models with fewer parameters. …”
Get full text
Article -
326
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs
Published 2024-09-01“…In this paper, cryptanalysis of Xiong’s CLAS scheme revealed its vulnerabilities to partial key replacement and identity replacement attacks, alongside mathematical errors in the batch verification process. …”
Get full text
Article -
327
NON EPILEPTIC PAROXYSMAL EVENTS IMITATING EPILEPSY IN CHILDREN
Published 2017-03-01“…The most frequent diagnostic errors were linked to the lack of objective information about the nature of paroxysms and misinterpretation of the EEG. …”
Get full text
Article -
328
An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme
Published 2013-01-01“…However, we will show that Wen and Li's scheme cannot withstand insider attack and forward secrecy, does not provide anonymity for the users, and inefficiency for error password login. …”
Get full text
Article -
329
Recapture voice replay detection based on phase spectrum
Published 2017-08-01“…Meanwhile,the equal error rate (EER) of the ASV system has dropped about 22% with this method being integrated,which indicates that the system’s ability of resisting playback attack is enhanced.…”
Get full text
Article -
330
Side-Channel Free Measurement-Device- Independent Quantum Key Distribution Based on Source Monitoring
Published 2023-01-01“…To remove those assumptions, here we construct a scheme on characterizing the source modulation errors with Hong-Ou-Mandel (HOM) interferences. Furthermore, we combine it with the decoy-state method and present the security analysis. …”
Get full text
Article -
331
A high-throughput ResNet CNN approach for automated grapevine leaf hair quantification
Published 2025-01-01“…Additional validation between expert vs. non-expert on six varieties showed that non-experts contributed to over- and underestimation of the trait, with an absolute error of 0% to 30% and -5% to -60%, respectively. …”
Get full text
Article -
332
Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing
Published 2025-04-01“…It possesses numerous benefits like cost minimization, few medical errors with better healthcare access and tracking. …”
Get full text
Article -
333
Identity-Based Online/Offline Encryption Scheme from LWE
Published 2024-09-01“…To overcome the shortcoming of existing identity-based encryption (IBE) schemes in resisting quantum attacks, we introduce an IBE scheme based on learning with errors (LWE). …”
Get full text
Article -
334
A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques
Published 2025-03-01“…Quantum entanglement sources fortify secure communication protocols, improving resistance to attacks. Quantum information networks (QINs) enhance computing, sensing, and security capabilities over extended distances. …”
Get full text
Article -
335
Graph neural networks embedded with domain knowledge for cyber threat intelligence entity and relationship mining
Published 2025-04-01“…The escalating frequency and severity of cyber-attacks have presented formidable challenges to the safeguarding of cyberspace. …”
Get full text
Article -
336
Sistem Monitoring Frekuensi Denyut Nadi pada Pelari Menggunakan Metode Photoplethysmographic
Published 2021-11-01“…Alat yang dirancang memiliki error maksimum sebesar 0,73% berdasarkan data percobaan dari 5 partisipan. …”
Get full text
Article -
337
Stroke in children and adolescents: topical problems of pre-hospital diagnostics
Published 2020-01-01“…Particular attention is paid to the features of the symptoms of stroke and stroke-like conditions («stroke masks») in the pediatric population and the analysis of the main factors that influence errors in the early diagnosis of stroke in children and adolescents. …”
Get full text
Article -
338
Trajectory privacy protection scheme based on differential privacy
Published 2021-09-01“…To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient sampling model based on time generalization and spatial segmentation was presented, and a k-means clustering algorithm was designed to process sampling data.By employing the differential privacy mechanism, the trajectory data was disturbed to solve the user privacy leaking problem caused by the attacker with powerful background knowledge.Simultaneously, to respond to the error boundary of the query range of pandemic, an effective prediction mechanism was designed to ensure the availability of released public track data.Simulation results demonstrate that compared with the existing trajectory differential privacy protection methods, the proposed scheme has obvious advantages in terms of processing efficiency, privacy protection intensity, and data availability.…”
Get full text
Article -
339
Opportunistic access control scheme for enhancing IoT-enabled healthcare security using blockchain and machine learning
Published 2025-03-01“…However, recent sophisticated security and privacy attacks such as data breaches, data integrity issues, and data collusion have raised concerns in the healthcare industry. …”
Get full text
Article -
340
Multimodal malware classification using proposed ensemble deep neural network framework
Published 2025-05-01“…The cross-domain research in data fusion strives to integrate information from multiple sources to augment reliability and minimize errors in detecting sophisticated cyber threats. This collaborative approach is the least addressed and pivotal for protecting against the advancing environment of modern malware attacks. …”
Get full text
Article