|
|
|
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado...
ver más
|
|
|
|
|
|
|
Junyi Cheng, Xianfeng Zhang, Xiao Chen, Miao Ren, Jie Huang and Peng Luo
Early detection of people?s suspicious behaviors can aid in the prevention of crimes and make the community safer. Existing methods that are focused on identifying abnormal behaviors from video surveillance that are based on computer vision, which are mo...
ver más
|
|
|
|
|
|
|
Yaseen Khan, Surendra Thakur, Obiseye Obiyemi and Emmanuel Adetiba
Bots (social robots) are computer programs that replicate human behavior in online social networks. They are either fully automated or semi-automated, and their use makes online activism vulnerable to manipulation. This study examines the existence of so...
ver más
|
|
|
|
|
|
|
Guillermo A. Martínez-Mascorro, José R. Abreu-Pederzini, José C. Ortiz-Bayliss, Angel Garcia-Collantes and Hugo Terashima-Marín
Crime generates significant losses, both human and economic. Every year, billions of dollars are lost due to attacks, crimes, and scams. Surveillance video camera networks generate vast amounts of data, and the surveillance staff cannot process all the i...
ver más
|
|
|
|
|
|
|
Dimitrios Myridakis, Paul Myridakis and Athanasios Kakarountas
Recently, there has been a sharp increase in the production of smart devices and related networks, and consequently the Internet of Things. One concern for these devices, which is constantly becoming more critical, is their protection against attacks due...
ver más
|
|
|
|
|
|
|
Huseyn Huseynov, Tarek Saadawi and Kenichi Kourai
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual l...
ver más
|
|
|
|
|
|
|
Calum C. Hall, Lynsay A. Shepherd and Natalie Coull
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of ...
ver más
|
|
|
|
|
|
|
Elena Faccio and Lucrezia Guiotto Nai Fovino
The food industry is constantly challenged to find new ideas to satisfy the increasingly specific consumer demand. However, innovative food products do not always become part of consumption habits or create a market. One of the major sources of resistanc...
ver más
|
|
|
|
|
|
|
Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain and Muhammad Qasim Memon
A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don?t cooperate with...
ver más
|
|
|
|
|
|
|
Gabriel Arquelau Pimenta Rodrigues, Robson De Oliveira Albuquerque, Flávio Elias Gomes de Deus, Rafael Timóteo De Sousa Jr., Gildásio Antônio De Oliveira Júnior, Luis Javier García Villalba and Tai-Hoon Kim
Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its n...
ver más
|
|
|
|