R Rawat - International Journal of Information Technology, 2023 - Springer
The backbone of the semantic web is ontology, dealing with the context of details associated with a specific domain. Domain ontology (DO) is an important source of information for …
Since 2014, Emotet has been using Man-in-the-Browsers (MITB) attacks to target companies in the finance industry and their clients. Its key aim is to steal victims' online money-lending …
On the dark web (DW), criminal's are technologically knowledgeable so security agencies must keep up to speed with all data sources in endeavors to find criminals and identify their …
Because of the computational processing, seamless functioning and benefits that it gives to Android-users, cyber thieves have been drawn towards it. Conventional AMD: android …
Cyber security issues relating to thermal power stations (TPS) are the major focus of concern towards the development of digital computing equipment. Stuxnet, the computer virus that …
P Vyas, G Vyas, A Chauhan, R Rawat… - … Intelligence for the …, 2022 - igi-global.com
Advancement in technology provides numerous solutions to not only legitimate businesses but to illegal trades as well. Selling substances, drugs, and prohibited merchandise and …
Artificial intelligence and its societal and ethical implications are complicated and conflictingly interpreted. Surveillance is one of the most ethically challenging concepts in AI …
The Industrial Internet of Things (IIoT) also referred as Cyber Physical Systems (CPS) as critical elements, expected to play a key role in Industry 4.0 and always been vulnerable to …
A city is considered to be smart when the application of Artificial Intelligence (AI) and the Internet of Things (IoT) is integrated with it. This enables the collection of data from people …