|
|
|
I-Hsien Liu, Meng-Huan Lee, Hsiao-Ching Huang and Jung-Shian Li
New mobile network technologies, particularly 5G, have spurred a growth in smart healthcare networks. They enable real-time monitoring, personalized treatments, and more. However, these transformative capabilities have also uncovered potential vulnerabil...
ver más
|
|
|
|
|
|
Afrah Almansoori, Mostafa Al-Emran and Khaled Shaalan
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior ...
ver más
|
|
|
|
|
|
Natalia Sánchez-Patiño, Gina Gallegos-Garcia and Mario E. Rivero-Angeles
Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, thi...
ver más
|
|
|
|
|
|
Faeiz Alserhani and Alaa Aljared
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to...
ver más
|
|
|
|
|
|
Xueping Song, Shuyu Zhang, Jianming Yang and Jicun Zhang
Many security detectors do not have the ability to output individual luggage package images and are not compatible with deep learning algorithms. In this paper, a luggage package extraction of X-ray images based on the ES-MBD (Edge Sensitive Multi-channe...
ver más
|
|
|