Artificial Intelligence (AI) has emerged as a transformative force in the field of cybersecurity, playing a pivotal role in safeguarding national infrastructure. This review focuses on the …
J Gu, L Zhao, X Yue, NI Arshad… - Information Processing & …, 2023 - Elsevier
Abstract Information security has more demand for digital technology. Every industry transfers its data through computer networks for legal communication. The Internet of Things …
Protecting private data in smart homes, a popular Internet-of-Things (IoT) application, remains a significant data security and privacy challenge due to the large-scale …
Telehealth, a cornerstone of Healthcare 4.0 has widespread adoption owing to its convenience and efficiency. However, the secure transmission of patient records over the …
In August of 2022, the United States Department of Treasury sanctioned the virtual currency mixer Tornado Cash, an open-source and fully decentralised piece of software running on …
B Aljabhan, MA Obaidat - Sustainability, 2023 - mdpi.com
The fierce competition in international markets and the rapid advancements in information technology result in shorter lead times, lower transportation capacity, and higher demand …
Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent …
The manufacturing industry comprises various departments, and the supply chain is crucial in ensuring uninterrupted commodity flow during production. However, traditional supply …
X Liu, Z Huang, Q Wang, B Wan - Electronics, 2023 - mdpi.com
Consensus algorithms are the essential components of blockchain systems. They guarantee the blockchain's fault tolerance and security. The Proof of Work (PoW) consensus algorithm …