Search Results - Security and Protection General Terms Algorithms

Refine Results
  1. 1

    Machine Learning for Computer and Cyber Security: Principles, Algorithms, and Practices by Gupta, Brij B., Sheng, Michael

    ISBN: 9781138587304, 1138587303, 9780367780272, 0367780275
    Published: Boca Raton, Fla CRC Press 2019
    “…While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software…”
    Get full text
    eBook Book
  2. 2

    Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications by Hasan, Mohammad Kamrul, Shafiq, Muhammad, Islam, Shayla, Pandey, Bishwajeet, Baker El-Ebiary, Yousef A., Nafi, Nazmus Shaker, Ciro Rodriguez, R., Vargas, Doris Esenarro

    ISSN: 1076-2787, 1099-0526
    Published: Hoboken Hindawi 2021
    Published in Complexity (New York, N.Y.) (2021)
    “…As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet…”
    Get full text
    Journal Article
  3. 3

    Methods, Algorithms, and Means of Remote Long-Term Monitoring of the Security and Safety of People and their Property by Shevchuk, B. M.

    ISSN: 1060-0396, 1573-8337
    Published: Cham Springer International Publishing 01.07.2025
    Published in Cybernetics and systems analysis (01.07.2025)
    “…The methodological and algorithmic foundations for the operation of terminal, local-regional, and global wireless networks for long-term monitoring of the security and safety of large groups of people…”
    Get full text
    Journal Article
  4. 4

    Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation by Wachter, Sandra, Mittelstadt, Brent, Floridi, Luciano

    ISSN: 2044-3994, 2044-4001
    Published: Oxford Oxford University Press 01.05.2017
    Published in International data privacy law (01.05.2017)
    “…’ of decisions made by automated and artificially intelligent algorithmic systems is legally mandated by the forthcoming European Union General Data Protection Regulation 2016/679 (GDPR…”
    Get full text
    Journal Article
  5. 5

    Why a Right to Legibility of Automated Decision-Making Exists in the General Data Protection Regulation by Malgieri, Gianclaudio, Comandé, Giovanni

    ISSN: 2044-3994, 2044-4001
    Published: Oxford Oxford University Press 01.11.2017
    Published in International data privacy law (01.11.2017)
    “…In the data-driven economy, the importance of algorithms has grown exponentially while artificial Intelligence applied to customer data management remains problematic for several reasons…”
    Get full text
    Journal Article
  6. 6

    Safety in the Digital Age: Sociotechnical Perspectives on Algorithms and Machine Learning by Le Coze, Jean-Christophe, Antonsen, Stian

    ISBN: 9783031326332, 3031326334, 9783031326325, 3031326326
    Published: Cham Springer Nature 2023
    “… The contributors whose work features in this book help their readers to navigate the massive increase in the capability to generate and use data in developing algorithms intended for automation…”
    Get full text
    eBook
  7. 7

    New modified algorithm: θ-turbulent flow of water-based optimization by Naderipour, Amirreza, Davoudkhani, Iraj Faraji, Abdul-Malek, Zulkurnain

    ISSN: 1614-7499, 0944-1344, 1614-7499
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2023
    “…). This paper proposes a novel and powerful algorithm, named turbulent flow of water-based optimization (TFWO…”
    Get full text
    Journal Article
  8. 8

    Prediction of drivers’ impact on green supply chain management using deep learning algorithm by Merneedi, Anjibabu, Palisetty, Ramesh

    ISSN: 0944-1344, 1614-7499, 1614-7499
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.01.2023
    “… The five primary dimensions are consumer intrusiveness, restructuring quality of supply chain, risk and security consciousness, and urbanization in the region leather industry, and the four major…”
    Get full text
    Journal Article
  9. 9

    A Distributed Topology-Protecting Collaboration Algorithm: Design and Performance Analysis by Wang, Zitong, Li, Yushan, Li, Ying, Fang, Chongrong, He, Jianping

    ISSN: 2168-2267, 2168-2275, 2168-2275
    Published: United States IEEE 01.11.2025
    Published in IEEE transactions on cybernetics (01.11.2025)
    “… The novelties include: 1) Compared with traditional noise-adding methods that inject decaying random inputs, the proposed algorithm constructs a novel noise term to increase the irregularity of the agents' states…”
    Get full text
    Journal Article
  10. 10

    Blockchain and IoT integration for secure short-term and long-term air quality monitoring system using optimized neural network by Chinnappan, Balasubramanian, Hakim, Kareemullah, Kumar, Neelam Sanjeev, Elumalai, Vijayalakshmi

    ISSN: 1614-7499, 0944-1344, 1614-7499
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2024
    “… and blockchain for robust analysis, precise predictions, and early pollution detection. Blockchain guarantees data integrity, security, and transparency…”
    Get full text
    Journal Article
  11. 11

    Load-frequency control in an islanded microgrid PV/WT/FC/ESS using an optimal self-tuning fractional-order fuzzy controller by Naderipour, Amirreza, Abdul-Malek, Zulkurnain, Davoodkhani, Iraj Faraji, Kamyab, Hesam, Ali, Roshafima Rasit

    ISSN: 1614-7499, 0944-1344, 1614-7499
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2023
    “…Due to the increased complexity and nonlinear nature of microgrid systems such as photovoltaic, wind-turbine fuel cell, and energy storage systems…”
    Get full text
    Journal Article
  12. 12

    Forecasting the renewable energy consumption of Australia by a novel grey model with conformable fractional opposite-direction accumulation by Wang, Huiping, Zhang, Zhun

    ISSN: 1614-7499, 0944-1344, 1614-7499
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2023
    “…The accurate prediction of renewable energy consumption (REC) is of great significance to ensure energy security, reduce dependence on fossil energy, and promote sustainable economic and social development…”
    Get full text
    Journal Article
  13. 13

    Trustworthy cyber-physical power systems using AI: dueling algorithms for PMU anomaly detection and cybersecurity by Cali, Umit, Catak, Ferhat Ozgur, Halden, Ugur

    ISSN: 1573-7462, 0269-2821, 1573-7462
    Published: Dordrecht Springer Netherlands 01.07.2024
    Published in The Artificial intelligence review (01.07.2024)
    “…). However, there are risks involved. As AI becomes more established, new security threats have emerged…”
    Get full text
    Journal Article
  14. 14

    GA-Based Q-Attack on Community Detection by Chen, Jinyin, Chen, Lihong, Chen, Yixian, Zhao, Minghao, Yu, Shanqing, Xuan, Qi, Yang, Xiaoniu

    ISSN: 2329-924X, 2373-7476
    Published: Piscataway IEEE 01.06.2019
    “… Here, we introduce and formalize the problem of community detection attack and develop efficient strategies to attack community detection algorithms by rewiring a small number of connections, leading…”
    Get full text
    Journal Article
  15. 15

    When the Internet Gets Under Our Skin: Reassessing Consumer Law and Policy in a Society of Cyborgs by Coldron, Benjamin Clubbs, La Diega, Guido Noto, Twigg-Flesner, Christian, Busch, Christoph, Stolte, Tabea, de Vries, Marc-Oliver

    ISSN: 1573-0700, 0168-7034, 1573-0700
    Published: New York, NY Springer US 01.09.2025
    Published in Journal of consumer policy (01.09.2025)
    “… In the era of the consumer Internet of Things (IoT), consumer expectations of privacy, security, and durability are changing…”
    Get full text
    Journal Article
  16. 16

    An Enhanced Model for Smart Healthcare by Integrating Hybrid ML, LSTM, and Blockchain by Kumar, Chanumolu Kiran, Nagamani, G. Muni

    ISSN: 1633-1311, 2116-7125
    Published: Edmonton International Information and Engineering Technology Association (IIETA) 01.01.2025
    Published in Ingénierie des systèmes d'Information (01.01.2025)
    “… To that end, we have proposed a holistic model that integrates several advanced methodologies to help in enhanced disease prediction and patient monitoring, with data security and privacy protection…”
    Get full text
    Journal Article
  17. 17

    A new cross-domain prediction model of air pollutant concentration based on secure federated learning and optimized LSTM neural network by Huang, Guangqiu, Zhao, Xixuan, Lu, Qiuqin

    ISSN: 0944-1344, 1614-7499, 1614-7499
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.01.2023
    “…), differential privacy laplace mechanism (DPLA) and long and short-term memory network optimized by sparrow search algorithm (SSA-LSTM…”
    Get full text
    Journal Article
  18. 18

    The Role of Artificial Intelligence in Cybersecurity: Automation of Protection and Detection of Threats by Lysenko, Serhii

    ISSN: 0424-2513, 0976-4666
    Published: New Delhi New Delhi Publishers 01.02.2024
    Published in Economic affairs (Calcutta) (01.02.2024)
    “… intelligence tools in the cybersecurity system to automate the protection and timely detection of threats…”
    Get full text
    Journal Article
  19. 19

    PISA: A proximity-based social networking (PBSN) protection model by Ramtohul, Asslinah Mocktoolah, Khedo, Kavi Kumar

    ISSN: 0955-1662, 1743-4645
    Published: London Palgrave Macmillan UK 01.03.2023
    Published in Security journal (01.03.2023)
    “… Despite the success of these solutions, there is a research gap in terms of the evaluation and analysis of their protection features…”
    Get full text
    Journal Article
  20. 20

    A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization by Fouad, Mohamed R., Elbassioni, Khaled, Bertino, Elisa

    ISSN: 1041-4347, 1558-2191
    Published: New York IEEE 01.07.2014
    “… In this paper, we address both scalability and privacy risk of data anonymization. We propose a scalable algorithm that meets differential…”
    Get full text
    Journal Article