Science topic
Security Measures - Science topic
Regulations to assure protection of property and equipment.
Publications related to Security Measures (10,000)
Sorted by most recent
This chapter explores the integration of Generative Artificial Intelligence (AI) in bolstering the security of Web applications. It delves into how AI-driven techniques can be employed to predict, detect, and mitigate security threats in real-time, thereby safeguarding Web-based systems from potential vulnerabilities. Through a comprehensive analys...
The technological revolution has significantly transformed various aspects of our daily lives, particularly financial transactions. As these transactions increasingly occur over wired and networked systems, protecting confidential and personal information from potential intruders has become critical, underscoring the necessity for secure mobile pay...
This research analyzes cloud computing environments' inherent security and privacy risks. It examines crucial aspects of cloud security, including data encryption, access control mechanisms, identity management, and the implementation of firewalls and intrusion detection systems. The study emphasizes the significance of regular security audits, com...
Recent advances in IoT, machine learning, and edge computing have driven transformative paradigms like smart cities, grids, healthcare, and transportation systems, providing efficient solutions. This has led to a pervasive proliferation of connected devices, ranging from high-power computers to low-power sensors. Yet, the complex IoT architecture p...
This critical review explores the relationship between jus cogens-peremptory norms in international law-and the regulation of privacy and personal freedoms in the context of the internet. Jus cogens norms, such as the prohibition of torture and the right to privacy, are foundational principles that hold universal applicability and cannot be derogat...
As Industry 4.0 and the Industrial Internet of Things continue to advance, industrial control systems are increasingly adopting IT solutions, including communication standards and protocols. As these systems become more decentralized and interconnected, a critical need for enhanced security measures arises. Threat modeling is traditionally performe...
There is a growing need for an image encryption scheme, for huge amount of
social media data or even the medical data to secure the privacy of the patients
or the user. This study introduces a ground-breaking deep learning architecture
named crypto generative adversarial networks (CryptoGAN), a novel
architecture for generating cipher images. This...
Audio piracy in the real-time transmission has intensified with digital replication and distribution, making unauthorized sharing effortless and widespread, leading to a significant hurdle in securing the original audio data. To counter this, computationally efficient and robust audio security measures like audio encryption play a pivotal role. In...
This paper introduces a novel iris recognition framework by integrating the Black Widow Optimization (BWO) algorithm with Convolutional Neural Networks (CNNs), forming the Black Widow-CNN (BW-CNN) framework. The necessity of this work stems from the increasing demand for secure and reliable biometric systems, particularly in iris recognition, which...
Defense cooperation is an important pillar of the strategic partnership between the United States and India. Since the Modi government came to power in 2014, the defense cooperation between the United States and India has entered the fast lane. The two countries have made breakthroughs on multiple fronts, such as the signing of foundational agreeme...
This paper aims to analyze the effects of disinformation campaigns and importance of strategic communication by creating public awareness to counter disinformation campaigns in Pakistan. Neglecting strategic communication can leave room for external powers to influence narratives and divert attention from important social, economic, and political i...
This study delves into the factors that drive the adoption of cryptocurrencies and digital assets within the Islamic finance sector while emphasizing the transformative potential of these technologies for Islamic online payments and investment avenues. The research highlights the essential need for adherence to Shariah principles. Using the Diffusi...
The COVID-19 pandemic has profoundly reshaped global business operations, exposing firms to unprecedented risks and challenging established management practices. Traditional risk management frameworks, designed for pre-pandemic conditions, often proved inadequate in addressing the dynamic complexities of a post-COVID-19 world. This study identifies...
The belief of the author inspires this article that despite the risks associated with the implementation of artificial intelligence in the domain of national security, it will continue in the future due to the overall trend of digitalization and modernization in all areas of social life. Effective government control over the use of AI systems can h...
Robotic Process Automation (RPA) has emerged as a transformative technology in modern enterprises, automating repetitive tasks and enhancing efficiency. However, as RPA becomes increasingly integrated within organizational networks, it also introduces new security vulnerabilities. Configuring firewalls and Intrusion Detection/Prevention Systems (ID...
This study examines the implementation and adoption of Electronic Health Record (EHR) systems in developing countries, focusing on challenges, strategies, and future directions. A comprehensive literature review and thematic analysis methodology was employed to synthesize findings from various case studies and research papers. The analysis reveals...
The spatio-temporal data of intelligent and connected vehicles (ICVs) represent crucial surveying and mapping data generated by these vehicles. The massive collection, processing, and aggregation of such data pose potential security risks to geographic information security and even national security. This paper analyzes the significance of spatio-t...
the Internet has provided a new delivery mechanism that can increase the speed, scale, and power of an attack on the national security and integrity of the nation. The threat is so potent that its impact is horrible than any act of terrorism. Cyber warfare attacker affect national critical infrastructures, including everything from elections to ele...
In an era marked by the rapid digitization of data and the widespread adoption of cloud computing, the security of sensitive information has emerged as a paramount concern for organizations and individuals alike. This dissertation explores the integration of cryptographic techniques into cloud computing and big data security, emphasizing the need f...
Text CAPTCHAs are crucial security measures deployed on global websites to deter unauthorized intrusions. The presence of anti-attack features incorporated into text CAPTCHAs limits the effectiveness of evaluating them, despite CAPTCHA recognition being an effective method for assessing their security. This study introduces a novel color augmentati...
With the heavy reliance on computers and information technology to send and receive data across networks of various types, there has been concern about securing that data from intrusions and cyber-attacks. The expansion of network usage has led to an increase in hacker attacks, which has led to prioritizing cybersecurity precautions in detecting po...
The current global situation brings new security challenges associated with wars and man-made disasters, such as
those caused by large-scale cyberattacks. Modern cyberattacks have now reached a scale that they have devastating
consequences comparable to physical weapons used in traditional warfare. In some states, such as Israel and China,
cyberatt...
In the field of cybersecurity, hackers often enter computer systems despite current security measures, owing to the huge amount of network traffic that makes intruder identification difficult. Differentiating between authorized traffic and abnormal data produced by Distributed Denial of Service (DDoS) attackers is still a major difficulty. This res...
The security and privacy of personal data have become a significant concern because of the vulnerability of wireless channels and the theft of sensitive information. Several security measures have been implemented in recent years to address this problem. Nevertheless, most protocols currently employed are insufficiently secure for mobile ad hoc net...
While the proliferation of the Internet of Things (IoT) has revolutionized several industries, it has also created severe data security concerns. The security of these network devices and the dependability of IoT networks depend on efficient threat detection. Device heterogeneity, computing resource constraints, and the ever-changing nature of cybe...
The advent of technology has transformed traditional libraries into digital repositories known as electronic libraries. This abstract presents an overview of an electronic library system developed using C# programming language and SQL Server database management system. The primary objective of this system is to provide users with a digital platform...
Machine learning (ML) is changing cybersecurity by enabling progressed discovery, anticipation and reaction instruments. This paper gives a comprehensive survey of ML's part in cybersecurity, looking at both hypothetical systems and down to earth usage. It diagrams the rising dangers focusing on ML models, such as ill-disposed assaults, information...
Digital transformation is a trend in the information service industry that is gaining traction. Enterprises can benefit from the development of innovative business models as well as improved service quality and efficiency, thereby promoting sustainable development of the information services industry. A rapid advancement in technology has led to th...
The rapid proliferation of Internet of Things (IoT) devices has significantly expanded the attack surface for cyber threats, highlighting the need for advanced security measures to protect these interconnected systems. Traditional Intrusion Detection Systems (IDS) often struggle to keep pace with the evolving threat landscape in IoT environments du...
With the increasing amounts of electric vehicles on the road, the demand for public charging stations increases as well. While alternating current (AC) is used for charging at home, direct current (DC) fast charging is commonly used when travel-ing long distances. Since DC fast charging requires higher level communication between vehicle and chargi...
Cloud computing has significant advantages in terms of scalability, cost-effectiveness, and accessibility, transforming several industries such as education, healthcare, banking, and agriculture. Nevertheless, the inherent hazards linked to data security and privacy in cloud systems present notable obstacles. This paper focuses on a variety of secu...
As quantum computing starts to pose significant security risks to traditional cryptographic systems, quantum cryptography is emerging as a key solution. This paper examines how quantum key distribution (QKD) and other quantum-based cryptographic methods can strengthen cybersecurity. By leveraging principles from quantum mechanics-like superposition...
The start of smart cities has transformed urban living by using modern technology to improve effectiveness, sustainability, and overall quality of life. The Internet of Things (IoT) is an important aspect of this transition, since it links diverse devices and systems to enable smooth data sharing and intelligent decision-making. However, the rise o...
The pursuit of lightweight yet robust materials for armour applications in defence and security has been a focal point of research and development efforts for decades. This research highlights a comprehensive study aimed at optimizing the performance of ceramic composites based on alumina and boron carbide for armour applications. The investigation...
This research explores the impact of Management Information Systems (MIS) on user experience in private bank mobile banking, focusing specifically on the effectiveness of m-BCA. Utilizing a descriptive quantitative approach, the study aims to understand how mobile banking features, including accessibility, user interface, security, and functionalit...
Background: The Internet of Things (IoT) has improved many aspects that have impacted the industry and the people’s daily lives. To begin with, the IoT allows communication to be made across a wide range of devices, from household appliances to industrial machinery. This connectivity allows for a better integration of the pervasive computing, makin...
The emergence and acceptance of digital technology have caused information pollution and an infodemic on Online Social Networks (OSNs), blogs, and online websites. The malicious broadcast of illegal, objectionable and misleading content causes behavioural changes and social unrest, impacts economic growth and national security, and threatens users’...
Immigration policy, particularly regarding migrants crossing the US-Mexico border, has been a highly debated topic for years. There is a continued debate on how to maintain national security while protecting the health and dignity of migrants. In this commentary, we argue that the Biden Administration’s “Proclamation on Securing the Border” issued...
State sovereignty as the cornerstone of international law and relations, faces unprecedented challenges in the digital age. This article examines the evolving nature of sovereignty through the lens of foreign interference in U.S. elections, with a particular focus on alleged Russian and Chinese activities. By analyzing the intersection of internati...
The rise of credit card fraud has emerged as a significant threat to global financial systems, affecting consumers, financial institutions, and the broader economy. This paper critically analyzes the economic impact of various types of credit card fraud, including activation fraud, limit upgrade manipulation, cashback scams, discount fraud, and ove...
This study aims to discover the level of psychological security of the nursing staff. To find out, the psychological security measure prepared-Fatah was applied to a sample Of the workers of the nursing sector in the state of Blida estimated 32 nurses (19 public sector, 13: private sector) The study found that:-Nursing workers have a low level of p...
This paper presents a comprehensive architecture for an AI-driven trading platform designed to enhance trading precision, optimize portfolio returns, and manage real-time risk. Leveraging advanced machine learning, natural language processing, and reinforcement learning, the platform integrates a multi-layered infrastructure that enables data-drive...
In an era where digital transformation accelerates the adoption of Application Programming Interfaces (APIs) across industries, the security of these APIs has emerged as a critical concern. As businesses increasingly integrate APIs to facilitate communication between services and applications, the potential for cyber threats to exploit vulnerabilit...
This study investigates the impact of integrating DevSecOps and Generative Artificial Intelligence (GAI) on software delivery performance within technology firms. Utilizing a qualitative research methodology, the research involved semi-structured interviews with industry practitioners and analysis of case studies from organizations that have succes...
The study critically examined the various cases of communal violence in Ibaa community (2011-2021) and its effect on socioeconomic development in the area, Emohua Local Government Area and Nigeria. This was with the view of exposing the causes, effects on the livelihood of the indigenes and how it impacts on national security. The study highlights...
In the evolving digital landscape, interconnected IoT networks are expanding fast. However, essential security measures are often lacking, which makes it vulnerable to cyber threats. Intrusion Detection Systems (IDSs) are crucial in combating these threats, but IDSs in the IoT domain face significant challenges; one of them is the existence of imba...
Health care and health security are the fundamental pillars of disaster preparedness and crisis management. An established routine health care is necessary for any society, enabling full access to care and fulfilling the rights of every individual. Health security, on the other hand, is what a society needs to be flexible in managing an unexpected...
Intrusion detection has been a commonly adopted detective security measures to safeguard systems and networks from various threats. A robust intrusion detection system (IDS) can essentially mitigate threats by providing alerts. In networks based IDS, typically we deal with cyber threats like distributed denial of service (DDoS), spoofing, reconnais...
The rise of sophisticated cyber threats has necessitated a paradigm shift in cybersecurity protocols, moving from traditional detection methods to proactive defense strategies. Neural networks and artificial intelligence (AI) are at the forefront of this transformation, providing enhanced capabilities for threat identification, analysis, and respon...
The European Parliament adopted the European General Data Protection Regulation (GDPR, EU 2016/679), which revolutionized the legislative framework for personal data protection within the European Union. The GDPR mandates organizations to shift from a passive approach, relying on minimum security measures outlined in the 1994 EU Directive, to a pro...
Recently, the Nigerian state has been under severe insecurity which has substantially undermined law and order as well as the protection of lives and property. Since the transition to civil rule in 1999, violent security challenges have surged with different perpetrators such as militants, kidnappers, cultists, pirates and terrorists, insurgents an...
Context. The primary objective of this article is to explore aspects related to ensuring security and enhancing the efficiency of authentication processes in intelligent systems through the application of visual biometrics. The focus is on advancing and refining authentication systems by employing sophisticated biometric identification methods. Obj...
Smart contracts have attracted significant attention within the blockchain ecosystem due to their ability to automate agreements when specific pre-defined conditions are met. However, concerns about the reliability of smart contracts persist due to potential vulnerabilities and unexpected outcomes. This study seeks to examine the perception of vari...
This paper highlights the importance of the state's role in refugee employment in Bulgaria. It analyses the current labour market's needs in Bulgaria and the opportunity for more beneficiaries of international protection to compensate, at least to some extent, the manpower shortage in the country. The present study shows that in the current politic...
Facial-based recognition systems are commonly used for building access control, with the accuracy and computing requirements still being improved.
On the other hand, QR codes are gaining rising attention as an input
interface to many embedded applications. This paper proposes an embedded access control system that customises both previous technique...
This theoretical exploration investigates the impact of blockchain technology on e-commerce security and trust within the Indian context. As India continues to experience rapid growth in digital transactions and online retail, ensuring security and building consumer trust have become paramount challenges. With its decentralized, transparent, and im...
A diversified energy basket strengthens resilience and reduce vulnerability to international vagaries in crude oil prices. For a country with moribund refineries, extensive illegal oil bunkering, over reliant on imported fossil fuel, and poor energy mix, the adoption of Compressed Natural Gas (CNG) becomes a determining alternate to transportation,...
The 1960s and 1970s were a period of profound social upheaval in the United States, with the civil rights and anti-war movements challenging longstanding norms and government policies. In response, federal agencies like the FBI and CIA launched covert operations—COINTELPRO and Operation CHAOS, respectively—aimed at surveilling, infiltrating, and, i...
This review analyzes the relationship between cyber war and the use of psychological warfare techniques, specifically discussing the modern ways with which nations and non-state actors can conduct deception, communication, and national security threats using the new age technologies. Having studied more than sixty studies published in peer-reviewed...
The emergence of the coronavirus, officially known as SARS-CoV-2, posed an immediate threat to national security and public health. Despite initial attempts to downplay its seriousness, the pandemic swiftly induced widespread fear worldwide. President Donald Trump positioned himself as a "wartime president", advocating for a comprehensive campaign...
This study explores the factors influencing national security effectiveness by examining structure and functionality, interagency coordination, policy alignment, and democratic governance. It also identifies key areas for improvement. The aim is to evaluate how these elements impact national security outcomes. The study surveyed 470 officials acros...
India’s vison of Security and Growth for all in the Region (SAGAR) encompasses a host of policies of which Neighbourhood First is an important element. India’s Ministry of External Affairs tags the policy as an ‘Institutional Priority’ which “….guides its approach towards the management of relations with countries in its immediate neighbourhood, th...
Discover the intricate challenges Brazil faces in its battle against organized crime, focusing on notorious groups like the Primeiro Comando da Capital (PCC), Comando Vermelho (CV), and various militias. This study delves into how these criminal organizations jeopardize public security and destabilize economic and social structures through activiti...
As quantum computing advances, traditional cryptographic security measures, including token obfuscation, are increasingly vulnerable to quantum attacks. This paper introduces a quantum-enhanced approach to token obfuscation leveraging quantum superposition and multi-basis verification to establish a robust defense against these threats. In our meth...
Machine learning (ML) technologies become integral to various applications, the security and robustness of these models are increasingly under scrutiny. This literature review explores the diverse spectrum of attacks targeting ML models, focusing on adversarial attacks, data poisoning, model inversion, and extraction. By analyzing existing methodol...
As the deployment of autonomous vehicles (AVs) accelerates, the reliance on data for operational efficiency, safety, and user experience becomes increasingly critical. However, this dependency raises significant concerns regarding the secure storage and transmission of sensitive data. This paper explores the multifaceted nature of data within AVs,...
In an era where digital interactions are increasingly mediated by APIs (Application Programming Interfaces), ensuring their security has become paramount. APIs serve as critical conduits for data exchange among applications, facilitating various functionalities in modern software development. However, their widespread use has also made them appeali...
The rise of the Communist struggle in Malaysia was divided into two stages beginning in 1948-1960 (First Emergency) and 1969-1989 (Second Emergency). From this period Malaya and Malaysian government form KESBAN (Security and Development) to eradicate Communist influence. Since fall of Soviet Union in 1991 The relevance of the KESBAN doctrine is oft...
Proportionality mandates that harm caused to civilians and civilian property must be minimal in relation to an anticipated military advantage. In Nigeria, the fight against insurgency has necessitated military operations aimed at neutralizing insurgent threats and restoring peace and stability. However, these operations have often resulted in signi...
This paper argues for the strategic treatment of artificial intelligence as a key industry within broader industrial policy framework of Pakistan, underscoring the importance of aligning it with national goals such as economic resilience and preservation of autonomy. The paper starts with defining industrial policy as a set of targeted government i...
In an increasingly interconnected digital landscape, the traditional perimeter-based security models are becoming obsolete. The emergence of the Zero Trust security framework, which operates on the principle of "never trust, always verify," is essential for protecting sensitive data in cloud environments. This article explores the transformative ro...
As the number of Internet of Things (IoT) devices continues to grow exponentially, securing these connected devices has become a critical challenge for organizations. IoT devices often lack robust security measures, making them vulnerable to cyberattacks. This paper explores the role of AI-powered cloud security solutions in addressing these vulner...
This article provides a comprehensive analysis of Cross-Site Scripting (XSS) attacks, a prevalent security threat in web applications. It explores the mechanisms behind XSS attacks, the vulnerabilities they exploit, and the potential consequences for both users and organizations. The article critically evaluates various prevention and detection str...
As the world transitions into the quantum age, the dynamics of sustainable business development are evolving significantly. Organizations must adapt to rapidly advancing technologies while ensuring their operations remain secure and resilient against emerging cyber threats. This paper explores the intersection of artificial intelligence (AI), cyber...
This paper explores the topic of worship and security measures in places of worship in the Old Testament. The purpose of this study is to compare the findings from the analysis of the Old Testament with the contemporary South African context. Given the recent upsurge of church robberies in South Africa, this research aims to identify approaches uti...
The ongoing insurgency and banditry in northern Nigeria and the government's harsh attempts to put it down have resulted in a wave of refugees and internally displaced people. Increase in population density and the migration of displaced people into places that are thought to be relatively quiet are prominently causing significant security concerns...
As cloud adoption continues to accelerate, the risk of insider threats has become a critical security concern for organizations. Insider threats, posed by employees, contractors, or trusted third parties, can lead to significant data breaches, financial loss, and reputational damage. The cloud's distributed and multi-tenant nature adds complexity t...
In today's digital landscape, characterized by an ever-increasing reliance on cloud technologies, cybersecurity has become a paramount concern for organizations globally. Data-driven artificial intelligence (AI) models are emerging as critical tools for enhancing cybersecurity measures, enabling organizations to proactively identify and mitigate th...
In the rapidly evolving business landscape, the integration of artificial intelligence (AI) and technology has emerged as a pivotal strategy for enhancing data protection while driving business development. This paper explores innovative approaches that leverage AI-driven solutions to bolster data security, streamline operations, and foster custome...
According to research, the vast majority of road accidents (90%) are the result of human error, with only a small percentage (2%) being caused by malfunctions in the vehicle. Smart vehicles have gained significant attention as potential solutions to address such issues. In the future of transportation, travel comfort and road safety will be ensured...
The increasing reliance on Application Programming Interfaces (APIs) for digital interactions has heightened the demand for robust security measures across various industries. APIs facilitate seamless communication between different software applications, enabling functionalities that enhance user experiences and streamline business processes. Howe...
In the face of increasingly sophisticated cyber threats, the need for advanced cybersecurity solutions has never been more critical. This paper explores the revolutionary potential of leveraging machine learning (ML) in enhancing network security and information security infrastructures. As traditional security measures struggle to keep pace with t...
The rapid growth of cloud computing has revolutionized the IT landscape, but it has also introduced new security challenges. As cloud environments become more complex, traditional security measures often fall short in detecting sophisticated cyber threats. Artificial Intelligence (AI) has emerged as a transformative tool in enhancing cloud security...
As the reliance on cloud computing continues to grow, so does the complexity of cybersecurity threats targeting cloud infrastructures. Deep learning, a subset of artificial intelligence, has emerged as a pivotal technology in enhancing cloud-based cybersecurity solutions. This article explores the multifaceted role of deep learning in identifying,...
In the digital age, enterprises face an increasing number of cybersecurity threats that jeopardize sensitive data and operational integrity. Intelligent infrastructure protection, powered by artificial intelligence (AI) and machine learning (ML), is revolutionizing data security and cloud security strategies for organizations. These advanced techno...
As cloud computing becomes an integral part of modern IT infrastructure, the need for robust security governance and compliance frameworks grows increasingly critical. Artificial intelligence (AI) is emerging as a transformative technology in this space, enabling organizations to enhance their cloud security measures and meet compliance requirement...
In today's rapidly evolving business landscape, strategic digital transformation has become imperative for organizations seeking to enhance their development and ensure robust data protection. As emerging technologies such as artificial intelligence (AI), blockchain, and cloud computing reshape operational paradigms, businesses must harness these i...
As organizations increasingly migrate to cloud environments, the need for robust security measures becomes paramount. Intrusion Detection Systems (IDS) play a critical role in monitoring network traffic for suspicious activity and potential threats. Traditional IDS methods often struggle with the vast amounts of data generated in cloud infrastructu...
In an era where cloud computing is pivotal for business operations, ensuring the security of these environments has become increasingly complex due to the rapid rise of sophisticated cyber threats. This article explores the integration of behavioral analytics powered by artificial intelligence (AI) to enhance anomaly detection in cloud systems. By...
The deployment of Internet of Things (IoT) systems in Defense and National Security faces some limitations that can be addressed with Edge Computing approaches. The Edge Computing and IoT paradigms combined bring potential benefits, since they confront the limitations of traditional centralized cloud computing approaches, which enable easy scalabil...
This study introduces a fresh approach to boost the security and accuracy of predicting photovoltaic (PV) power generation using secure aggregation techniques. The author will focus on several key stages in the PV data lifecycle, such as collecting, transmitting, storing, and analyzing data. To protect against potential attacks and prevent informat...
The rapid adoption of cloud computing has transformed the way organizations manage and store sensitive data, leading to increased vulnerabilities and cybersecurity threats. As cloud environments evolve, traditional security measures often fall short, necessitating innovative solutions to safeguard critical information. This article explores the piv...
Quantum computing represents a transformative shift in computational capabilities, with profound implications for cybersecurity. This paper explores the dual nature of quantum computing's impact on the field: as both a challenge to existing cryptographic protocols and an opportunity for developing advanced security measures. We begin by examining t...