Search Results - Security and Protection General Terms Algorithms
-
1
Machine Learning for Computer and Cyber Security: Principles, Algorithms, and Practices
ISBN: 9781138587304, 1138587303, 9780367780272, 0367780275Published: Boca Raton, Fla CRC Press 2019“…While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software…”
Get full text
eBook Book -
2
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
ISSN: 1076-2787, 1099-0526Published: Hoboken Hindawi 2021Published in Complexity (New York, N.Y.) (2021)“…As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet…”
Get full text
Journal Article -
3
Methods, Algorithms, and Means of Remote Long-Term Monitoring of the Security and Safety of People and their Property
ISSN: 1060-0396, 1573-8337Published: Cham Springer International Publishing 01.07.2025Published in Cybernetics and systems analysis (01.07.2025)“…The methodological and algorithmic foundations for the operation of terminal, local-regional, and global wireless networks for long-term monitoring of the security and safety of large groups of people…”
Get full text
Journal Article -
4
Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation
ISSN: 2044-3994, 2044-4001Published: Oxford Oxford University Press 01.05.2017Published in International data privacy law (01.05.2017)“…’ of decisions made by automated and artificially intelligent algorithmic systems is legally mandated by the forthcoming European Union General Data Protection Regulation 2016/679 (GDPR…”
Get full text
Journal Article -
5
Why a Right to Legibility of Automated Decision-Making Exists in the General Data Protection Regulation
ISSN: 2044-3994, 2044-4001Published: Oxford Oxford University Press 01.11.2017Published in International data privacy law (01.11.2017)“…In the data-driven economy, the importance of algorithms has grown exponentially while artificial Intelligence applied to customer data management remains problematic for several reasons…”
Get full text
Journal Article -
6
Safety in the Digital Age: Sociotechnical Perspectives on Algorithms and Machine Learning
ISBN: 9783031326332, 3031326334, 9783031326325, 3031326326Published: Cham Springer Nature 2023“… The contributors whose work features in this book help their readers to navigate the massive increase in the capability to generate and use data in developing algorithms intended for automation…”
Get full text
eBook -
7
New modified algorithm: θ-turbulent flow of water-based optimization
ISSN: 1614-7499, 0944-1344, 1614-7499Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2023Published in Environmental science and pollution research international (01.06.2023)“…). This paper proposes a novel and powerful algorithm, named turbulent flow of water-based optimization (TFWO…”
Get full text
Journal Article -
8
Prediction of drivers’ impact on green supply chain management using deep learning algorithm
ISSN: 0944-1344, 1614-7499, 1614-7499Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.01.2023Published in Environmental science and pollution research international (01.01.2023)“… The five primary dimensions are consumer intrusiveness, restructuring quality of supply chain, risk and security consciousness, and urbanization in the region leather industry, and the four major…”
Get full text
Journal Article -
9
A Distributed Topology-Protecting Collaboration Algorithm: Design and Performance Analysis
ISSN: 2168-2267, 2168-2275, 2168-2275Published: United States IEEE 01.11.2025Published in IEEE transactions on cybernetics (01.11.2025)“… The novelties include: 1) Compared with traditional noise-adding methods that inject decaying random inputs, the proposed algorithm constructs a novel noise term to increase the irregularity of the agents' states…”
Get full text
Journal Article -
10
Blockchain and IoT integration for secure short-term and long-term air quality monitoring system using optimized neural network
ISSN: 1614-7499, 0944-1344, 1614-7499Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2024Published in Environmental science and pollution research international (01.06.2024)“… and blockchain for robust analysis, precise predictions, and early pollution detection. Blockchain guarantees data integrity, security, and transparency…”
Get full text
Journal Article -
11
Load-frequency control in an islanded microgrid PV/WT/FC/ESS using an optimal self-tuning fractional-order fuzzy controller
ISSN: 1614-7499, 0944-1344, 1614-7499Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2023Published in Environmental science and pollution research international (01.06.2023)“…Due to the increased complexity and nonlinear nature of microgrid systems such as photovoltaic, wind-turbine fuel cell, and energy storage systems…”
Get full text
Journal Article -
12
Forecasting the renewable energy consumption of Australia by a novel grey model with conformable fractional opposite-direction accumulation
ISSN: 1614-7499, 0944-1344, 1614-7499Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2023Published in Environmental science and pollution research international (01.10.2023)“…The accurate prediction of renewable energy consumption (REC) is of great significance to ensure energy security, reduce dependence on fossil energy, and promote sustainable economic and social development…”
Get full text
Journal Article -
13
Trustworthy cyber-physical power systems using AI: dueling algorithms for PMU anomaly detection and cybersecurity
ISSN: 1573-7462, 0269-2821, 1573-7462Published: Dordrecht Springer Netherlands 01.07.2024Published in The Artificial intelligence review (01.07.2024)“…). However, there are risks involved. As AI becomes more established, new security threats have emerged…”
Get full text
Journal Article -
14
GA-Based Q-Attack on Community Detection
ISSN: 2329-924X, 2373-7476Published: Piscataway IEEE 01.06.2019Published in IEEE transactions on computational social systems (01.06.2019)“… Here, we introduce and formalize the problem of community detection attack and develop efficient strategies to attack community detection algorithms by rewiring a small number of connections, leading…”
Get full text
Journal Article -
15
When the Internet Gets Under Our Skin: Reassessing Consumer Law and Policy in a Society of Cyborgs
ISSN: 1573-0700, 0168-7034, 1573-0700Published: New York, NY Springer US 01.09.2025Published in Journal of consumer policy (01.09.2025)“… In the era of the consumer Internet of Things (IoT), consumer expectations of privacy, security, and durability are changing…”
Get full text
Journal Article -
16
An Enhanced Model for Smart Healthcare by Integrating Hybrid ML, LSTM, and Blockchain
ISSN: 1633-1311, 2116-7125Published: Edmonton International Information and Engineering Technology Association (IIETA) 01.01.2025Published in Ingénierie des systèmes d'Information (01.01.2025)“… To that end, we have proposed a holistic model that integrates several advanced methodologies to help in enhanced disease prediction and patient monitoring, with data security and privacy protection…”
Get full text
Journal Article -
17
A new cross-domain prediction model of air pollutant concentration based on secure federated learning and optimized LSTM neural network
ISSN: 0944-1344, 1614-7499, 1614-7499Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.01.2023Published in Environmental science and pollution research international (01.01.2023)“…), differential privacy laplace mechanism (DPLA) and long and short-term memory network optimized by sparrow search algorithm (SSA-LSTM…”
Get full text
Journal Article -
18
The Role of Artificial Intelligence in Cybersecurity: Automation of Protection and Detection of Threats
ISSN: 0424-2513, 0976-4666Published: New Delhi New Delhi Publishers 01.02.2024Published in Economic affairs (Calcutta) (01.02.2024)“… intelligence tools in the cybersecurity system to automate the protection and timely detection of threats…”
Get full text
Journal Article -
19
PISA: A proximity-based social networking (PBSN) protection model
ISSN: 0955-1662, 1743-4645Published: London Palgrave Macmillan UK 01.03.2023Published in Security journal (01.03.2023)“… Despite the success of these solutions, there is a research gap in terms of the evaluation and analysis of their protection features…”
Get full text
Journal Article -
20
A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
ISSN: 1041-4347, 1558-2191Published: New York IEEE 01.07.2014Published in IEEE transactions on knowledge and data engineering (01.07.2014)“… In this paper, we address both scalability and privacy risk of data anonymization. We propose a scalable algorithm that meets differential…”
Get full text
Journal Article

