|
|
|
Mahmoud Elkhodr, Samiya Khan and Ergun Gide
In the modern digital landscape of the Internet of Things (IoT), data interoperability and heterogeneity present critical challenges, particularly with the increasing complexity of IoT systems and networks. Addressing these challenges, while ensuring dat...
ver más
|
|
|
|
|
|
|
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How...
ver más
|
|
|
|
|
|
|
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ...
ver más
|
|
|
|
|
|
|
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ...
ver más
|
|
|
|
|
|
|
Guillermo Calahorra-Candao and María José Martín-de Hoyos
This study develops a theoretical framework integrating the Technology Acceptance Model (TAM) and Uses and Gratifications Theory (UGT) to predict and understand the acceptance of voice shopping intentions, particularly through AI-driven voice assistants....
ver más
|
|
|
|
|
|
|
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume...
ver más
|
|
|
|
|
|
|
Tenzin Norbu, Joo Yeon Park, Kok Wai Wong and Hui Cui
Blockchain technology has become significant for financial sectors, especially digital payment systems, offering enhanced security, transparency, and efficiency. However, there is limited research on the factors influencing user trust in and acceptance o...
ver más
|
|
|
|
|
|
|
Sakorn Mekruksavanich and Anuchit Jitpattanakul
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individ...
ver más
|
|
|
|
|
|
|
Hamad Almaghrabi, Ben Soh and Alice Li
Effective and efficient use of information and communication technology (ICT) systems in the administration of educational organisations is crucial to optimise their performance. Earlier research on the identification and analysis of ICT users? satisfact...
ver más
|
|
|
|
|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|
|