[PDF][PDF] Cybersecurity of critical infrastructure

E Viganò, M Loi, E Yaghmaei - The Ethics of Cybersecurity, 2020 - library.oapen.org
This chapter provides a political and philosophical analysis of the values at stake in
ensuring cybersecurity for critical infrastructures. It presents a review of the boundaries of …

[PDF][PDF] Protecting ourselves from Digital Crime

D Chudasama, N Rajput - National Journal of Cyber Security Law, 2021 - researchgate.net
Cybercrime is a complex and truly evolving wonder. Digital hoodlums are getting more
refine what's more, are focusing on purchasers just as open and private associations. In this …

Userfocus-tool for criminality control of social networks at both the local and international level

S Šišulák - Entrepreneurship and Sustainability Issues, 2017 - hal.science
There are many benefits, but also risks related to using the social networks. Among the
benefits of social networking belong an easy way to be kept in touch, sharing news, photos …

Securing IoMT Devices to Protect the Future of Healthcare from Rising Cyberattacks

V Saranya, T Devi, N Deepa - … in Internet of Medical Things and …, 2024 - taylorfrancis.com
The healthcare sector is moving to a systematic approach for all medical and health issues.
The Internet of Medical Things (IoMT) is the systematic approach that is the collection of …

[PDF][PDF] Minimize cyber losses in cyber world through the optimization technique

N Kumar, P Chaudhary - International Journal of Computer …, 2014 - academia.edu
In the modern era, internet plays crucial role in the human life. Now that time it is a backbone
of human life. In Twentyfirst century criminals increasingly rely on these technologies and …

LDS–LVAT: Lie Detection System–Layered Voice Technology

K Veena, K Meena, D Rajalakshmi, M Fathima… - … in Internet of Medical … - taylorfrancis.com
When dealing with criminal cases, investigators find detecting lies and dishonesty to be a
considerable issue. In comparison to normal human conduct, the process of identifying a liar …

[图书][B] Multilayer reversible watermarking using non-underflow difference expansion

MSBIN ABDULLAH - 2012 - core.ac.uk
Use of digital reversible watermarNing has grown tremendously in the last few years. The
watermarNing embeds an invisible payload into digital content for the purpose of copyright …

A Unified Modeling Language Model for Occurrence and Resolving of Cyber Crime

S Rashmi, S Vipin - … Design and Intelligent Applications: Proceedings of …, 2016 - Springer
In the current scenario, distributed computing systems play significant role for accessing the
various kinds of internet services. The different handheld devices like palmtop, laptop …

[PDF][PDF] LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE USING MODULUS OPERATION WITH PIXEL GROUPING SELECTION DERIVED FROM K-MAP …

SBIN JAAFAR - 2013 - eprints.utm.my
As demand for information exchange across the network increases, so is the need for safe
covert communication, which can be achieved using steganography. Many steganography …