|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Woo-Hyun Choi and Jung-Ho Lewe
This study proposes a deep learning model utilizing the BACnet (Building Automation and Control Network) protocol for the real-time detection of mechanical faults and security vulnerabilities in building automation systems. Integrating various machine le...
ver más
|
|
|
|
|
|
|
Guillermo Calahorra-Candao and María José Martín-de Hoyos
This study develops a theoretical framework integrating the Technology Acceptance Model (TAM) and Uses and Gratifications Theory (UGT) to predict and understand the acceptance of voice shopping intentions, particularly through AI-driven voice assistants....
ver más
|
|
|
|
|
|
|
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani...
ver más
|
|
|
|
|
|
|
Ujwal Sharma, Uma Shankar Medasetti, Taher Deemyad, Mustafa Mashal and Vaibhav Yadav
This review paper addresses the escalating operation and maintenance costs of nuclear power plants, primarily attributed to rising labor costs and intensified competition from renewable energy sources. The paper proposes a paradigm shift towards a techno...
ver más
|
|
|
|
|
|
|
Ishaani Priyadarshini
The swift proliferation of the Internet of Things (IoT) devices in smart city infrastructures has created an urgent demand for robust cybersecurity measures. These devices are susceptible to various cyberattacks that can jeopardize the security and funct...
ver más
|
|
|
|
|
|
|
Bing Su and Jiwu Liang
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and sec...
ver más
|
|
|
|
|
|
|
Jing Liu, Xuesong Hai and Keqin Li
Massive amounts of data drive the performance of deep learning models, but in practice, data resources are often highly dispersed and bound by data privacy and security concerns, making it difficult for multiple data sources to share their local data dir...
ver más
|
|
|
|
|
|
|
Ali Eghmazi, Mohammadhossein Ataei, René Jr Landry and Guy Chevrette
The Internet of Things (IoT) is a technology that can connect billions of devices or ?things? to other devices (machine to machine) or even to people via an existing infrastructure. IoT applications in real-world scenarios include smart cities, smart hou...
ver más
|
|
|
|
|
|
|
Guofeng Wang, Baohui Zhao and Mengqi Zhao
Global warming affects food security and ecological security, and it threatens economic stability and sustainable agricultural development. The transformation and development of agriculture have significant implications for the achievement of the ?dual-c...
ver más
|
|
|
|