An insight review on multimedia forensics technology

S Gupta, P Garg - Cyber Crime and Forensic Computing: Modern …, 2021 - degruyter.com
Crime will turn into the principle issue step by step of our general public so it is important to
find a few ways to beat the issue; that is the reason the expression “media legal” is …

Supervising healthcare schemes using machine learning in breast Cancer and internet of things (SHSMLIoT)

M Lamba, G Munjal, Y Gigras - Internet of Healthcare Things …, 2022 - Wiley Online Library
The 21st‐century era of advancement in Information Technology and emerging applications
like the Internet of Things (IoT) have altered the lifestyle of people and its contribution in the …

Designing an ensemble of classifiers for smartphone-based indoor localization irrespective of device configuration

P Roy, C Chowdhury - Multimedia Tools and Applications, 2021 - Springer
WiFi-based indoor localization is a popular approach as most buildings and campuses are
WiFi-enabled and its fingerprints are captured by smartphones carried by every individual …

Cloud menu: Cloud based network analysis for disease‐diet associations and recommendations

R Toor, I Chana - Concurrency and Computation: Practice and …, 2024 - Wiley Online Library
Food is one of the most underrated entities with respect to diseases. Food or Diet plays a
vital role in healing or recovery of a patient which brings forth the need of analyzing disease …

Parameter aware utility proportional fairness scheduling technique in a communication network

N Kumar, A Ahmad, S Awasthi… - International Journal of …, 2021 - inderscienceonline.com
Conventionally, real-time (inelastic) users and non-real-time (elastic) users are scheduled
separately. Further, some users may be left without getting any radio resources. In real …

Data Privacy and Protection: Legal and Ethical Challenges

O Renuka, N RadhaKrishnan, BS Priya… - Emerging Threats …, 2025 - Wiley Online Library
This chapter explores data privacy in the digital era. It examines legal and ethical challenges
arising from technological advancements and data‐driven processes. Fundamental data …

Threats and Countermeasures for IoT and Smart Devices

A Suman, P Suman, S Padhy, R Jahan… - Emerging Threats and …, 2025 - Wiley Online Library
Summary The Internet of Things (IoT) diversifies the Internet of the future and has attracted
considerable attention. Securing IoT‐enabled devices for communication is a vital concern …

Social Engineering Attacks in Industrial Internet of Things and Smart Industry: Detection and Prevention

MM Aslam, K Kalinaki, A Tufail… - Emerging Threats …, 2025 - Wiley Online Library
Technological progress has bridged the gap between humans and machines. However, this
rapid advancement has brought new challenges due to the rising wave of cyberattacks in …

Real-time, YOLO-based intelligent surveillance and monitoring system using jetson TX2

P Kumar, S Narasimha Swamy, P Kumar… - Data analytics and …, 2021 - Springer
In recent years, real-time surveillance and monitoring system is getting importance because
of security reasons. Government organizations, residential areas, commercial complexes …

[图书][B] Emerging Threats and Countermeasures in Cybersecurity

G Shrivastava, RP Ojha, S Awasthi, H Bansal… - 2024 - books.google.com
This book is an essential resource for anyone seeking to stay ahead in the dynamic field of
cybersecurity, providing a comprehensive toolkit for understanding and combating digital …