Local governments face critical challenges in the era of digital transformation, balancing the responsibility of safeguarding resident information and administrative documents while …
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing …
In recent years, investments in cybersecurity capabilities (CC) have emerged as an essential practice in reducing cyberattacks and optimizing the usage of technologies. Therefore …
Communication networks able to withstand hostile environments are critically important for disaster relief operations. In this paper, we consider a challenging scenario where drones …
Over the past half-decade, numerous federal funding agencies such as the National Science Foundation (NSF), National Academies of Science (NAS), and National Security and …
Advancements in artificial intelligence are leading researchers to find use cases that were not as straightforward to solve in the past. The use case of simulated autonomous driving …
N Tatipatri, SL Arun - IEEE Access, 2024 - ieeexplore.ieee.org
Continuous communication and information technology advancements facilitate the modernization of the conventional energy grid into an integrated platform. Internet-of-Things …
The main concept of a smart city is to join manual items with electronics, software, sensors, and network connectivity for data contact via Internet of Things (IoT) gadgets. IoT improves …
A Dimitrievski, T Loncar-Turukalo… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
This paper explores the ethical and security challenges of integrating Internet of Things technologies into health-care systems. We examine real-world ethical dilemmas, including …