Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








7,657 Hits in 4.8 sec

Evolved Machines Shed Light on Robustness and Resilience

Josh Bongard, Hod Lipson
2014 Proceedings of the IEEE  
If we follow this latter approach and evolve both the neural and morphological subsystems of machines, we can perform controlled experiments that provide unique insight into how bodies and brains can work  ...  interactions to inform the design of evolving and adaptive robots.  ...  Multiple Resilient Machines In [10] , we expanded the resilient machines approach to robot swarms.  ... 
doi:10.1109/jproc.2014.2312844 fatcat:63gzb5ii35fhxp4dlcx7cerccq

A Survey on the Role of Technological Innovation in Nigerian Deposit Money Bank Fraud Prevention

Kabiru Adeyemo, Fatoki Jacob Obafemi
2024 South Asian Journal of Social Studies and Economics  
The seamless integration of advanced technologies not only enhances security measures but also fosters a more robust, efficient, and resilient banking system, thereby mitigating risks and fostering sustainable  ...  advanced data analytics, machine learning algorithms, real-time monitoring systems, and block chain technology.  ...  In the ever-evolving landscape of cyber threats, Lee and Patel's empirical study in 2019 serves as a beacon, shedding light on the indispensable role of robust encryption and cybersecurity protocols in  ... 
doi:10.9734/sajsse/2024/v21i3790 fatcat:tkz4msz2mfenvng3k4hehwyiqm

Decentralized Architectures: A Paradigm for Scalable, Fault-Tolerant, and Efficient Distributed Systems

Rizalyn T. Maderazo, Department of Graduate Studies, Surigao Del Norte State University, Philippines, Jerry I. Teleron, Department of Graduate Studies, Surigao Del Norte State University, Philippines
2024 Engineering and Technology Journal  
systems in the face of evolving technological landscapes.  ...  This robustness enhances system reliability and ensures uninterrupted operation, crucial in mission-critical applications.  ...  A Comparative Analysis sheds light on the advantages of decentralized systems over traditional counterparts, emphasizing their adaptability and resilience.  ... 
doi:10.47191/etj/v9i02.16 fatcat:foebpfnxnrg4zickcpagltc34a

Cybersecurity in the Smart Grid: Vulnerabilities, Threats, and Countermeasures

Jordan Y. Arpilleda
2023 International Journal of Advanced Research in Science, Communication and Technology  
distribution, safeguarding vital infrastructure, ensuring uninterrupted energy services, and enhancing societal resilience  ...  This research paper comprehensively explores and investigated the Smart Grid's architectural vulnerabilities, analyzing evolving threat landscapes, and proposing strategic defense measures.  ...  This background study delves into the context and significance of Cybersecurity in the Smart Grid: Vulnerabilities, Threats, and Countermeasures, shedding light on the motivations, vulnerabilities, and  ... 
doi:10.48175/ijarsct-12364 fatcat:p736udgrpbekdamsdbedf7ehk4

Machine Learning with TensorFlow and PyTorch: A Comparative Analysis

2024 resmilitaris  
Machine learning frameworks play a pivotal position inside the development and deployment of modern fashions for a big selection of programs.  ...  Special emphasis is positioned on know-how the learning curve related to each framework, exploring their high-degree APIs, and assessing their extensibility for studies and production environments.  ...  that shed light on their respective abilties.  ... 
doi:10.48047/resmil.v10i1.21 fatcat:agpqglomqvgdbcrunt7mse55dm

A REVIEW OF ADVANCED ACCOUNTING TECHNIQUES IN US ECONOMIC RESILIENCE

Beryl Odonkor, Simon Kaggwa, Prisca Ugomma Uwaoma, Azeez Olanipekun Hassan, Oluwatoyin Ajoke Farayola
2024 Finance & Accounting Research Journal  
This research paper explores the transformative impact of advanced accounting techniques on US economic resilience.  ...  The regulatory framework's role in shaping accounting practices and the emerging focus on Environmental, Social, and Governance (ESG) reporting are discussed.  ...  Doing so will shed light on how advanced accounting practices contribute to the ability of the US economy to weather storms and recover robustly.  ... 
doi:10.51594/farj.v6i1.722 fatcat:dxamgozz6vbqjpfqw6aaqjciey

Innovative Approaches in Machine Design: Advancements, Challenges, and Future Prospects

P. P. Bhise
2024 Zenodo  
Challenges inherent in designing complex systems are addressed, with a focus on enhancing performance, efficiency, and sustainability while mitigating risks and optimizing cost-effectiveness.  ...  This paper explores innovative methodologies and advancements in machine design, encompassing various fields such as robotics, automation, and mechanical engineering.  ...  In this section, we review key studies and research findings that shed light on the advancements, challenges, and future prospects in machine design.  ... 
doi:10.5281/zenodo.10893606 fatcat:scr7mmtlenh7bmseveunzta6wm

Cybersecurity in the Financial Sector

Kalyani Priyadarshani, Dr. A. Rengarajan
2024 International Journal of Research Publication and Reviews  
Recommendations focus on investment priorities, technology adoption, and regulatory compliance.  ...  Emerging technologies like blockchain, AI, and quantum-safe cryptography offer promise but demand robust implementation.  ...  By examining these challenges, the paper seeks to shed light on the evolving landscape of cyber threats in the financial sector and underscore the critical role of cybersecurity measures in safeguarding  ... 
doi:10.55248/gengpi.5.0324.0709 fatcat:e3syno7t7bc33pqmsflxzwmrha

A comprehensive review of machine learning's role in enhancing network security and threat detection

Akoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, Olukunle Oladipupo Amoo
2024 World Journal of Advanced Research and Reviews  
Strategies for addressing these challenges and improving the robustness of machine learning models are explored.  ...  As network security threats continue to evolve in complexity and sophistication, there is a growing need for advanced solutions to enhance network security and threat detection capabilities.  ...  Through a thorough examination of existing literature and case studies, the review seeks to shed light on the potential of machine learning in addressing the evolving landscape of network security threats  ... 
doi:10.30574/wjarr.2024.21.2.0501 fatcat:66qfsv5qr5atzevylisba5e3xu

A critical review of emerging cybersecurity threats in financial technologies

Uchenna Joseph Umoga, Enoch Oluwademilade Sodiya, Olukunle Oladipupo Amoo, Akoh Atadoga
2024 International Journal of Science and Research Archive  
By shedding light on the evolving threats and vulnerabilities, the paper contributes to the ongoing discourse on safeguarding the integrity and security of financial technologies.  ...  A significant portion of the review focuses on the role of human factors in cybersecurity, emphasizing the need for robust training and awareness programs to empower financial professionals and users alike  ...  Organizations must invest in advanced technologies, employee training, and collaboration to stay resilient against evolving threats.  ... 
doi:10.30574/ijsra.2024.11.1.0284 fatcat:s65o4luqtjcrdfjhd3yjop6gli

Securing tomorrow's urban frontiers: A holistic approach to cybersecurity in smart cities

Amaresh Jha, Ananya Jha
2024 Information System and Smart City  
By understanding the technological landscape, our goal is to devise adaptive and resilient cybersecurity measures that safeguard critical infrastructures while preserving the privacy and security of citizens  ...  By addressing the intricate relationship between urbanization and technology, this project aspires to contribute to the creation of secure, resilient, and sustainable urban environments that harness the  ...  Existing studies, such as Kaspersky Lab's [9] analysis of IoT-related cyber threats, shed light on the evolving nature of these vulnerabilities.  ... 
doi:10.59400/issc.v3i1.418 fatcat:4rjowxxpzradvdyr7bw2c4vvei

Social Engineering: Its Significance and Implications for Future Research

Raushan Kumar, Dr.Shikha Tiwari
2024 International Journal of Research Publication and Reviews  
evaluation of training and awareness programs.  ...  This paper aims to explore the importance of social engineering, its various forms, and its implications for future research.  ...  This paper seeks to shed light on the importance of social engineering in the context of cybersecurity.  ... 
doi:10.55248/gengpi.5.0124.0324 fatcat:p7zd4kb3ungdxpm3774ap2ltam

Real-time detection of malicious intrusions and attacks in cybersecurity infrastructures enabled by IOT

Santhoshilaxmi Kotha, Prachethan Reddy Tekulapalli, Shiva Sai Vardhan Pogaku, Gouse Baig Mohammed, K. Satyanarayana, P.B. Bobba, A. Perveen, S. Debnath
2024 MATEC Web of Conferences  
On the three informational collections, NSL-KDD, KDDCup99, and UNSW-NB15, the result of notable cutting-edge DL classifiers accomplished the highest true rate (TNR) and highest detection the rate accompanying  ...  assaults: Brute Force XXS, Brute Force WEB, DoS_Hulk_Attack, the preparation and testing stages, it likewise guaranteed the privacy and honesty of delicate data having a place with clients and frameworks  ...  Through a comprehensive exploration of IDS mechanisms, algorithms, and advancements, this research aims to shed light on the evolving landscape of cyber threats and the corresponding need for sophisticated  ... 
doi:10.1051/matecconf/202439201127 fatcat:4a7juz47x5dlbmp6yp4dpqb6zi

CYBERSECURITY AWARENESS AND EDUCATION PROGRAMS: A REVIEW OF EMPLOYEE ENGAGEMENT AND ACCOUNTABILITY

Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, Prisca Ugomma Uwaoma, Azeez Olanipekun Hassan, Samuel Onimisi Dawodu
2024 Computer Science & IT Research Journal  
A comparative analysis of these approaches sheds light on their respective strengths and limitations.  ...  A central theme of this review revolves around the nexus between employee engagement and cybersecurity resilience.  ...  This detailed exploration aims to shed light on the intricacies of the cybersecurity threat landscape, encompassing various types of threats, emerging trends, motivations driving cyberattacks, vulnerabilities  ... 
doi:10.51594/csitrj.v5i1.708 fatcat:bkxt6pten5eqzahtdiw3oopl7q

A Hierarchical Deep Learning Architecture for Robust Intrusion Detection in Time-Evolving Security Landscapes

Shashank R R, Aditya A Navale, Indudhara S
2024 International Journal for Research in Applied Science and Engineering Technology  
Abstract: This paper introduces a novel architecture for Intrusion Detection Systems (IDS), designed to enhance resilience against adversarial attacks by integrating conventional machine learning (ML)  ...  The proposed system, termed DLL-IDS, comprises three key components: a DL-based IDS, an adversarial example (AE) detector based on local intrinsic dimensionality (LID), and an ML-based IDS.  ...  In [8] their seminal work, Szegedy et al. investigate the intriguing properties of neural networks, shedding light on the vulnerabilities and robustness of deep learning models.  ... 
doi:10.22214/ijraset.2024.58300 fatcat:csc3ff2mobfprhcuxilhxhnf54
« Previous Showing results 1 — 15 out of 7,657 results