Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 257 - 292
Published: Sept. 27, 2024
Social
engineering
in
social
media
and
online
interactions
has
emerged
as
a
critical
concern
the
digital
age,
driven
by
increasing
interconnectivity
sharing
of
personal
information
online.
This
study
is
motivated
growing
prevalence
cyberattacks
that
exploit
human
psychology
rather
than
technical
vulnerabilities,
targeting
individuals
through
platforms
where
they
share
details.
By
examining
various
techniques
such
phishing,
pretexting,
baiting.
research
highlights
methods
attackers
use
to
manipulate
specific
vulnerabilities
environments.
The
leverages
data
from
recent
cases
surveys
analyze
effectiveness
these
impact
on
both
organizations.
findings
underscore
significant
risks
posed
attacks,
revealing
psychological
underpinnings
make
tactics
so
effective.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 257 - 271
Published: March 4, 2024
The
primary
driver
of
this
expansion
is
the
internet
user,
who
expected
to
connect
64
billion
devices
worldwide
by
2026.
Nearly
$20
trillion
will
be
spent
on
IoT
devices,
services,
and
infrastructure,
according
Business
Insider.
Many
cybercrimes
vulnerabilities
related
cybercrime
are
committed
with
use
data.
Asset
management,
fitness
tracking,
smart
cities
homes
examples
security
applications.
average
person
most
likely
own
two
six
connected
end
year,
a
significant
increase
over
total
number
cell
phones,
desktop
computers,
tablets.
Although
data
provides
plethora
opportunities
for
its
users,
some
have
taken
advantage
these
advantages
illegal
purposes.
In
particular,
great
deal
made
possible
gathering,
storing,
analyzing,
sharing
as
well
widespread
distribution
without
users'
knowledge
or
consent
required
legal
protections.
Furthermore,
because
analysis,
transfer
happen
at
scales
that
governments
organisations
unprepared
for,
there
cybersecurity
threats.
Protection,
privacy,
system
network
all
related.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 343 - 361
Published: March 4, 2024
In
this
chapter
the
authors
have
proposed
framework
that
we
are
using
various
techniques
to
overcome
above
mentioned
challenges
and
proving
exact
identification
extraction
of
WQI
by
classifying
them
according
their
domain.
The
has
been
represented
in
system
level
design
as
a
high
view
dependent
data
integration
architectural
design.
Being
multi-database-oriented
system,
it
is
scalable
structure
well
unstructured
source.
wrapper
mediator
module
used
map
web-query-interface
global
schema
integrated
web
query
interfaces.
implemented
modeling
from
end
users'
point
view;
operational
also
represented.
Advances in electronic government, digital divide, and regional development book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 139 - 152
Published: Jan. 24, 2024
In
this
chapter,
the
authors
propose
a
novel
recommendation
algorithm
for
patient-centric
healthcare
that
utilizes
learning
applications.
The
aims
to
predict
and
recommend
suitable
applications
patients
based
on
their
individual
needs
preferences.
By
leveraging
machine
techniques
patient
data,
analyzes
various
factors
such
as
medical
history,
demographics,
personal
interests
generate
personalized
recommendations.
This
approach
enhances
experience
by
empowering
actively
engage
in
own
health
management
education.
algorithm's
effectiveness
is
evaluated
through
experiments
comparisons
with
existing
methods,
demonstrating
its
potential
improve
outcomes
overall
quality.
Advances in computational intelligence and robotics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 451 - 464
Published: Feb. 21, 2025
Epileptic
seizures
are
neurological
disruptions
that
can
severely
impact
an
individual's
quality
of
life
if
left
undetected
or
misdiagnosed.
Accurate
and
timely
detection
is
crucial
for
effective
intervention
management.
This
paper
proposes
Advanced
Seizure
Detection
Model
leveraging
Adaptive
Deep
Learning
Technique
integrated
with
a
Coordinate
Attention-based
Feature
Fusion
Approach.
The
model
designed
to
analyze
electroencephalogram
(EEG)
signals,
which
serve
as
critical
diagnostic
tool
epilepsy.
adaptive
deep
learning
framework
dynamically
optimizes
network
parameters
accommodate
the
variability
in
EEG
signals
across
different
patients.
Attention
Mechanism
enhances
model's
ability
focus
on
spatial
temporal
features,
ensuring
more
robust
representation
seizure
patterns.
Advances in computational intelligence and robotics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 213 - 230
Published: Feb. 21, 2025
It
is
one
of
today's
fastest
expanding
industries,
which
makes
a
career
in
cybersecurity
great
opportunity.
Many
novices
and
professionals
with
computer
science
backgrounds
may
benefit.
Cyber
has
become
crucial
for
businesses
organizations
to
navigate
the
future
develop
trust
an
unpredictable
world.
The
cyber
becoming
clearer
as
shift
away
from
tech-centric
threat-focused
methods
focus
on
benefits
integrating
throughout
organization.
Cybersecurity
critical
business.
hazards
grew
information
technology
problem
business
concern,
so
did
solutions,
eventually
complementing
strategic
objectives
growth.
link
between
value
impact
clearer.
emerged
differentiator
designing
implementing
strategies,
its
importance
digital
transformation
priorities
continues
grow.
To
truly
depict
growing
enterprises
today,
we
polled
over
1,000
global
c-suite
executives
companies
more
than
$500
million
revenue
various
regions
industries.
Executives
conduct
both
qualitative
quantitative
research
hazards,
company
actions,
future.