Showing 1 - 10 of 43
E-commerce technologies are increasingly adopted and used because they give companies a competitive edge and boost their profitability through access to international markets. Even though global e-commerce has grown over the past few years, many consumers lack confidence in e-commerce purchases....
Persistent link: https://www.econbiz.de/10014517304
study recommends a feature-based encryption scheme with a hidden access structure for medical IoT data security. While … recommended to convert identity-based encryption (IBE) into a feature-based encryption model (FBEM) using a universal conversion …
Persistent link: https://www.econbiz.de/10014505300
-knowledge proof encryption ensuring data integrity and privacy. The multi-critic deep deterministic policy gradient algorithm …
Persistent link: https://www.econbiz.de/10014543365
Data breaches have been causing havoc for many years and continue to rise, demanding a more comprehensive framework to assess their severity. This study proposes a cybersecurity risk quantification and classification framework, addressing a significant research gap in breach severity evaluation....
Persistent link: https://www.econbiz.de/10014532382
Blockchain is a distributed digital ledger technology that has revolutionized businesses, industries, and commerce by eliminating the need for a central storage and control authority. Blockchain presents time-stamped and immutable blocks of data that are not owned by any single entity but rather...
Persistent link: https://www.econbiz.de/10014532566
Global cyber-attacks significantly impact the economy, society, organizations, and individuals. Existing research on cyber-attacks lacks in demonstrating Artificial Intelligence (AI) based analytical solutions for providing country-wide cyber threat intelligence. Cyber strategists at a national...
Persistent link: https://www.econbiz.de/10014533236
This research is mainly focused on the adoption of cloud computing in the information technology (IT) industry of a developing country, Pakistan by using the theoretical lens of technology acceptance model (TAM) and Elaboration Likelihood Model (ELM). Cloud computing, being one of the latest...
Persistent link: https://www.econbiz.de/10014336859
Internet of Things (IoT) enabled networks are highly vulnerable to cyber threats due to insecure wireless communication, resource constraint architecture, different types of IoT devices, and a high volume of sensor data being transported across the network. Therefore, IoT-compatible...
Persistent link: https://www.econbiz.de/10014434087
Technology is pivotal in the rapid growth of services and intensifying the quality of life. Recent technology, like the Internet of Things (IoT), demonstrates an impressive performance in fast-forward development. Intrusion Detection System (IDS) is used as a lifeline to prevent attacks by...
Persistent link: https://www.econbiz.de/10014436765
The growing number of connected Internet of Things (IoT) devices has led to the daily growth of network botnet attacks. The networks of compromised devices controlled by a single entity can be used for malicious purposes such as denial of service distributed IoT botnet attacks and theft of...
Persistent link: https://www.econbiz.de/10014520396