Social Engineering in Social Media and Online Interactions DOI

Tarun Kumar Vashishth,

Vikas Sharma, Kewal Krishan Sharma

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 257 - 292

Published: Sept. 27, 2024

Social engineering in social media and online interactions has emerged as a critical concern the digital age, driven by increasing interconnectivity sharing of personal information online. This study is motivated growing prevalence cyberattacks that exploit human psychology rather than technical vulnerabilities, targeting individuals through platforms where they share details. By examining various techniques such phishing, pretexting, baiting. research highlights methods attackers use to manipulate specific vulnerabilities environments. The leverages data from recent cases surveys analyze effectiveness these impact on both organizations. findings underscore significant risks posed attacks, revealing psychological underpinnings make tactics so effective.

Language: Английский

Security Analysis of the Cyber Crime DOI
Ratnesh Kumar Shukla,

Arvind Tiwari

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 257 - 271

Published: March 4, 2024

The primary driver of this expansion is the internet user, who expected to connect 64 billion devices worldwide by 2026. Nearly $20 trillion will be spent on IoT devices, services, and infrastructure, according Business Insider. Many cybercrimes vulnerabilities related cybercrime are committed with use data. Asset management, fitness tracking, smart cities homes examples security applications. average person most likely own two six connected end year, a significant increase over total number cell phones, desktop computers, tablets. Although data provides plethora opportunities for its users, some have taken advantage these advantages illegal purposes. In particular, great deal made possible gathering, storing, analyzing, sharing as well widespread distribution without users' knowledge or consent required legal protections. Furthermore, because analysis, transfer happen at scales that governments organisations unprepared for, there cybersecurity threats. Protection, privacy, system network all related.

Language: Английский

Citations

7

The Proposed Framework of View-Dependent Data Integration Architecture DOI

Pradeep Kumar,

Madhurendra Kumar,

Rajeev Kumar

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 343 - 361

Published: March 4, 2024

In this chapter the authors have proposed framework that we are using various techniques to overcome above mentioned challenges and proving exact identification extraction of WQI by classifying them according their domain. The has been represented in system level design as a high view dependent data integration architectural design. Being multi-database-oriented system, it is scalable structure well unstructured source. wrapper mediator module used map web-query-interface global schema integrated web query interfaces. implemented modeling from end users' point view; operational also represented.

Language: Английский

Citations

7

Predictive Patient-Centric Healthcare DOI
Ajay B. Gadicha, Vijay B. Gadicha,

Mohammad Zuhair

et al.

Advances in electronic government, digital divide, and regional development book series, Journal Year: 2024, Volume and Issue: unknown, P. 139 - 152

Published: Jan. 24, 2024

In this chapter, the authors propose a novel recommendation algorithm for patient-centric healthcare that utilizes learning applications. The aims to predict and recommend suitable applications patients based on their individual needs preferences. By leveraging machine techniques patient data, analyzes various factors such as medical history, demographics, personal interests generate personalized recommendations. This approach enhances experience by empowering actively engage in own health management education. algorithm's effectiveness is evaluated through experiments comparisons with existing methods, demonstrating its potential improve outcomes overall quality.

Language: Английский

Citations

4

Drone-assisted air quality monitoring in urban areas DOI

Ishan Thakral,

Sakshi Kumari, Kalpana Singh

et al.

AIP conference proceedings, Journal Year: 2025, Volume and Issue: 3224, P. 020002 - 020002

Published: Jan. 1, 2025

Language: Английский

Citations

0

MQTT enabled smart parking management system DOI

Ishan Thakral,

Nikhil Aggarwal,

Vikas Malhotra

et al.

AIP conference proceedings, Journal Year: 2025, Volume and Issue: 3224, P. 020003 - 020003

Published: Jan. 1, 2025

Citations

0

Developing internet of things (IoT) based smart government model for Nepal DOI

Youba Raj Poudyal,

Gajendra Sharma,

Lok Bijaya Adhikari

et al.

AIP conference proceedings, Journal Year: 2025, Volume and Issue: 3224, P. 020007 - 020007

Published: Jan. 1, 2025

Language: Английский

Citations

0

Sentimental analysis using natural language processing DOI
Vikas Kumar, Abhay Bhatia, Sunil Kumar

et al.

AIP conference proceedings, Journal Year: 2025, Volume and Issue: 3224, P. 020054 - 020054

Published: Jan. 1, 2025

Language: Английский

Citations

0

A smart protective headgear for a rider DOI
Shivendra Verma,

Rohit Yadav,

Prashant .

et al.

AIP conference proceedings, Journal Year: 2025, Volume and Issue: 3224, P. 020053 - 020053

Published: Jan. 1, 2025

Language: Английский

Citations

0

Advanced Epileptic Seizure Detection Model Using Adaptive Deep Learning Technique With Coordinate Attention-Based Feature Fusion Approach DOI
Neeraj Kumari, Rajeev Kumar,

Rajiv Kumar Sharma

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 451 - 464

Published: Feb. 21, 2025

Epileptic seizures are neurological disruptions that can severely impact an individual's quality of life if left undetected or misdiagnosed. Accurate and timely detection is crucial for effective intervention management. This paper proposes Advanced Seizure Detection Model leveraging Adaptive Deep Learning Technique integrated with a Coordinate Attention-based Feature Fusion Approach. The model designed to analyze electroencephalogram (EEG) signals, which serve as critical diagnostic tool epilepsy. adaptive deep learning framework dynamically optimizes network parameters accommodate the variability in EEG signals across different patients. Attention Mechanism enhances model's ability focus on spatial temporal features, ensuring more robust representation seizure patterns.

Language: Английский

Citations

0

Cyber Security for Smart Factories Using Qualitative and Quantitative Research DOI
Ratnesh Kumar Shukla, Arvind Kumar Tiwari, Manmohan Mishra

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 213 - 230

Published: Feb. 21, 2025

It is one of today's fastest expanding industries, which makes a career in cybersecurity great opportunity. Many novices and professionals with computer science backgrounds may benefit. Cyber has become crucial for businesses organizations to navigate the future develop trust an unpredictable world. The cyber becoming clearer as shift away from tech-centric threat-focused methods focus on benefits integrating throughout organization. Cybersecurity critical business. hazards grew information technology problem business concern, so did solutions, eventually complementing strategic objectives growth. link between value impact clearer. emerged differentiator designing implementing strategies, its importance digital transformation priorities continues grow. To truly depict growing enterprises today, we polled over 1,000 global c-suite executives companies more than $500 million revenue various regions industries. Executives conduct both qualitative quantitative research hazards, company actions, future.

Language: Английский

Citations

0