July 2024
·
2 Reads
AI in Precision Oncology
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
July 2024
·
2 Reads
AI in Precision Oncology
May 2024
·
19 Reads
·
2 Citations
Enterprise Information Systems
January 2024
·
249 Reads
·
5 Citations
International Journal of Cloud Applications and Computing
The advent of the metaverse has revolutionized virtual interactions and navigation, introducing intricate access control challenges. This paper addresses the need for effective access control models in the cloud-based metaverse. It explores its distinct characteristics, including its dynamic nature, diverse user base, and shared spaces, highlighting privacy concerns and legal implications. The paper analyzes access control principles specific to the cloud-based metaverse, emphasizing least privilege, separation of duties, RBAC, defense-in-depth, and auditability/accountability. It delves into identity verification and authorization methods, such as biometrics, multi-factor authentication, and role-based/attribute-based authorization. Advanced access control technologies for the cloud-based metaverse are examined, including SSO solutions, blockchain-based access control, ABAC, adaptive access control, and VMI for isolation. Risk mitigation strategies encompass IDS/IPS, SIEM, and user education programs.
January 2024
·
4 Reads
Journal of Discrete Mathematical Sciences and Cryptography
As digital innovation advances, concerns surrounding privacy escalate. This manuscript explores the intricate relationship between machine learning and privacy preservation. Beginning with a comprehensive literature review, we delve into the current state of privacy in the digital age and examine machine learning’s role in addressing these concerns. The manuscript highlights key privacy-preserving techniques, including homomorphic encryption, differential privacy, and federated learning, providing in-depth insights into their applications and real-world implementations. Anticipating future challenges and trends, we recommend maintaining a delicate equilibrium between innovation and privacy in the dynamic landscape of machine learning.
November 2023
·
8 Reads
·
3 Citations
January 2023
·
1,424 Reads
·
21 Citations
The emergence of the metaverse, a virtual reality space, has ushered in a new era of digital experiences and interactions in global information systems. With its unique social norms and behaviors, this new world presents exciting opportunities for users to connect, socialize, and explore. However, as people spend more time in the metaverse, it has become increasingly apparent that the issue of cyberbullying needs to be addressed. Cyberbullying is a serious problem that can harm victims psychologically and physically. It involves using technology to harass, intimidate, or humiliate individuals or groups in global information systems. The risk of cyberbullying is high in the metaverse, where users are often anonymous. Therefore, it is crucial to establish a safer and more respectful culture within the metaverse to detect and prevent such incidents from happening.
... This approach not only enhances the detection of malicious activities but also aids in the investigation and response processes by providing clear, actionable insights into how decisions are made. The integration of XAI into IDS is presented as a crucial step toward more reliable and understandable security solutions for protecting cloud infrastructures [21]. The potential of using Explainable AI (XAI) to enhance the security of energy systems against cyberattacks. ...
November 2023
... Bautista-Villalpando and Abran (2021) [15] , AL-Qtiemat & AL-Odat, (2024) [5] , Sai Shreya and Kavitha (2024) [55] , Liubchenko & Volkov (2024) [37] , Reece et al. (2024) [54] , Amara et al. (2017) [6][7] , Kunduru (2023) [34] . Pranjal (2024) [50] , Bouchama and Kamal (2021) [18] , Shilpa (2024) [64] , Sharma (2024) [63] Upadhyay (2024) [69] 2 Data Encryption Amara et al. (2017) [6][7] , Bautista-Villalpando and Abran (2021) [15] , Shabbir et al. (2024) [61] , Bouchama and Kamal (2021) [18] Khodayer et al. (2024) [33] , Shilpa (2024) [64] , Arogundade (2024) [9] Saxena and Gayathri (2021) [58] Mukherjee (2019) [44] , George and Sagayarajan, (2023) [25] , AL-Qtiemat & AL-Odat, (2024) [5] , Sai Shreya, R., & Kavitha, R. (2024) [55] . Reece et al. (2024) [54] , Kunduru (2023) [34] and Pranjal (2024) [50] 3 Cloud network security AL-Qtiemat & AL-Odat, (2024) [5] , Alenezi (2021) [3] , Kunduru (2023) [34] , Bautista-Villalpando and Abran (2021) [15] , Shabbir et al. (2024) [61] , Shilpa (2024) [64] Sharma (2024) [63] Pranjal (2024) [50] , Amara et al. (2017) [6][7] , George and Sagayarajan, S. (2023) [25] . ...
January 2024
International Journal of Cloud Applications and Computing
... It makes use of the long-lasting effects of digital information and the possibility of a large audience causing emotional distress and harm to victims. Various tactics, such as education and awareness campaigns, social media campaigns, in-game events, policies and procedures, parental participation, and digital health interventions, can be used to reduce cyberbullying [7]. ...
January 2023