Ransomware is a strain of malware that disables access to the user's resources after infiltrating a victim's system. Ransomware is one of the most dangerous malware …
D An, D Hao, R Zhao, J Lu, Y Li, Y Zhang - Journal of King Saud University …, 2023 - Elsevier
As the saying goes, one image is worth ten thousand words. Because of the rich visual information carried by the image itself, previewers can easily find what they need. On the …
R Gafni, I Aviv, D Haim - Journal of Computer Information Systems, 2023 - Taylor & Francis
ABSTRACT Distributed Federated Collaboration Secured Services is a proposed novel secure distributed Unified Communication and Collaboration (UCC) reference architecture …
Digital activists use tools and platforms such as Facebook, WhatsApp, and Twitter to organize networked protest. However, these tools appear to lack the necessary features to …
AR Shahid, A Imteaj - IEEE Transactions on Artificial …, 2024 - ieeexplore.ieee.org
Cloud-based whiteboard services have gained immense popularity, facilitating seamless collaboration and communication. However, the open-ended and persistent nature of …
L Weinberger, C Eichenmüller… - Extended Abstracts of the …, 2023 - dl.acm.org
In the period from August to October 2022, we conducted an online survey concerning users' perception and use of videoconferencing systems. We collected and analyzed a total of 245 …
R Maleckas, KG Paterson, MR Albrecht - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Jitsi Meet is an open-source video conferencing system, and a popular alternative to proprietary services such as Zoom and Google Meet. The Jitsi project makes strong privacy …
X Zhang, Y Cai, F Liu, F Zhou - Kybernetes, 2024 - emerald.com
Purpose This paper aims to propose a solution for dissolving the “privacy paradox” in social networks, and explore the feasibility of adopting a synergistic mechanism of “deep-learning …
A Issaoui, J Örtensjö, MS Islam - Future Business Journal, 2023 - Springer
The adoption of cloud services offers manifold advantages to public organizations; however, ensuring data privacy during data transfers has become increasingly complex since the …