Dual use of Internet of Things technology in accounting automation and cybersecurity

O Desyatnyuk, V Muravskyi… - 2022 12th …, 2022 - ieeexplore.ieee.org
The digitalization of communication processes has contributed to the active spread of
Internet of Things (IoT) technology, which is dual used for automated processing of …

Cybersecurity of Industrial Systems—A 2023 Report

J Pochmara, A Świetlicka - Electronics, 2024 - mdpi.com
The article explores the importance of cybersecurity in Industry 4.0, specifically focusing on
safeguarding industrial automation systems from cyberattacks. It discusses essential security …

Essential security elements and phases of hacking attacks

CV Anchugam - Ethical hacking techniques and countermeasures for …, 2021 - igi-global.com
Cyber security provides protection against theft of data, protects computers from theft,
minimizes computer freezing, provides privacy for users, and offers strict regulation …

Threat models for vulnerability analysis of IoT devices for Manipulation of Demand attacks

JA Font, J Jarauta, R Gesteira… - 2023 JNIC …, 2023 - ieeexplore.ieee.org
The development of Internet of Things technologies has brought, along with new
opportunities, new types of risks to the table. This is exemplified by attacks like the …

Application and existing problems of computer network technology in the field of artificial intelligence

G Chen, Q Yuan - 2021 2nd International Conference on …, 2021 - ieeexplore.ieee.org
With the development of science and technology, computer technology is more and more
widely used in people's life. As a branch of computer technology, artificial intelligence …

Enhancing Security in the Internet of Medical Things: A Machine Learning Approach for Intrusion Detection Systems

M Bensaada - 2024 - dspace.univ-guelma.dz
The Internet of Medical Things (IoMT) revolutionizes healthcare by enabling real-time
monitoring and remote care but introduces significant security vulnerabilities. This thesis …

l'apprentissage en profond pour la cybersécurité dans l'Internet industriel des objets (IIoT)

A BRAHMIA - 2022 - dspace.univ-guelma.dz
Intrusion detection systems (IDS) are the subject of many studies and play an important role
in network security. The purpose of this study is to model such a system to help system …

[PDF][PDF] Challenges in Business Information Systems: General Policy and Marketing Implications for Cyber Security for Businesses in Developing Countries

R Naz, E Groves - 2020 - sadil.ws
In this digital era where businesses in developing countries are operating in a digital
environment, cyber security for businesses is a sphere that is advancing extensively. To …