JQ Li, FR Yu, G Deng, C Luo, Z Ming… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
This paper provides an overview of the Industrial Internet with the emphasis on the architecture, enabling technologies, applications, and existing challenges. The Industrial …
Insider threat has become a widely accepted issue and one of the major challenges in cybersecurity. This phenomenon indicates that threats require special detection systems …
U Inayat, M Farzan, S Mahmood, MF Zia… - Ain Shams Engineering …, 2024 - Elsevier
The increasing prevalence of cybercrime necessitates the implementation of robust security measures. The majority of these attacks are initiated by authorized users who possess …
A Kim, J Oh, J Ryu, K Lee - IEEE Access, 2020 - ieeexplore.ieee.org
Security professionals, government agencies, and corporate organizations have found an inherent need to prevent or mitigate attacks from insider threats. Accordingly, active research …
RA Alsowail, T Al-Shehari - Electronics, 2021 - mdpi.com
As technologies are rapidly evolving and becoming a crucial part of our lives, security and privacy issues have been increasing significantly. Public and private organizations have …
Edge intelligence, network autonomy, broadband satellite connectivity, and other concepts for private 6G networks are enabling new applications for public safety authorities, eg, for …
RA Alsowail, T Al-Shehari - PeerJ Computer Science, 2022 - peerj.com
With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the …
BACKGROUND Commercially-made low-cost electroencephalography (EEG) devices have become increasingly available over the last decade. One of these devices, Emotiv EPOC, is …
The advent of the metaverse has revolutionized virtual interactions and navigation, introducing intricate access control challenges. This paper addresses the need for effective …