Cybersecurity Affected Social Life Using Online Transactions in India DOI
Ratnesh Kumar Shukla, Arvind Kumar Tiwari

Advances in electronic government, digital divide, and regional development book series, Journal Year: 2024, Volume and Issue: unknown, P. 137 - 150

Published: Oct. 25, 2024

India is fast advancing its digital goals, with initiatives like Make in and Digital benefiting the economy. However, because of reliance on interconnected networks systems, cyber security challenging to implement. As one most often targeted countries cyberspace, India's cybersecurity resilience critical safeguarding vital assets. has taken a variety legislative organizational efforts bolster defences respond cybercrime more effectively. The Ministry Electronics Information Technology (MeitY) administers cybersecurity. Computer Emergency Response Team (CERT-IN), an institution within MeitY primary body charge dealing issues. CERT-IN also increases Indian Internet's defences.The government must act as facilitator, forming public-private partnership focusing user awareness education. Most significantly, privacy should be balanced while promoting R&D order preserve superiority cyberspace.

Language: Английский

The Proposed Framework of View-Dependent Data Integration Architecture DOI

Pradeep Kumar,

Madhurendra Kumar,

Rajeev Kumar

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 343 - 361

Published: March 4, 2024

In this chapter the authors have proposed framework that we are using various techniques to overcome above mentioned challenges and proving exact identification extraction of WQI by classifying them according their domain. The has been represented in system level design as a high view dependent data integration architectural design. Being multi-database-oriented system, it is scalable structure well unstructured source. wrapper mediator module used map web-query-interface global schema integrated web query interfaces. implemented modeling from end users' point view; operational also represented.

Language: Английский

Citations

10

Security Analysis of the Cyber Crime DOI
Ratnesh Kumar Shukla,

Arvind Tiwari

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 257 - 271

Published: March 4, 2024

The primary driver of this expansion is the internet user, who expected to connect 64 billion devices worldwide by 2026. Nearly $20 trillion will be spent on IoT devices, services, and infrastructure, according Business Insider. Many cybercrimes vulnerabilities related cybercrime are committed with use data. Asset management, fitness tracking, smart cities homes examples security applications. average person most likely own two six connected end year, a significant increase over total number cell phones, desktop computers, tablets. Although data provides plethora opportunities for its users, some have taken advantage these advantages illegal purposes. In particular, great deal made possible gathering, storing, analyzing, sharing as well widespread distribution without users' knowledge or consent required legal protections. Furthermore, because analysis, transfer happen at scales that governments organisations unprepared for, there cybersecurity threats. Protection, privacy, system network all related.

Language: Английский

Citations

8

Securing Critical Infrastructure with Blockchain Technology: An Approach to Cyber-Resilience DOI Creative Commons

Jaime Govea,

Walter Gaibor-Naranjo,

William Villegas-Ch

et al.

Computers, Journal Year: 2024, Volume and Issue: 13(5), P. 122 - 122

Published: May 15, 2024

Currently, in the digital era, critical infrastructure is increasingly exposed to cyber threats their operation and security. This study explores use of blockchain technology address these challenges, highlighting its immutability, decentralization, transparency as keys strengthening resilience vital structures. Through a methodology encompassing literature review, use-case analysis, development evaluation prototypes, effective implementation protection investigated. The experimental results reveal positive impact on security resilience, presenting solid defense against cyber-attacks due immutable decentralized structure, with 40% reduction incidents. Despite observed benefits, integration faces significant challenges scalability, interoperability, regulations. work demonstrates potential strengthen infrastructure. It marks progress towards blockchain’s practical adoption, offering clear direction for future research this evolving field.

Language: Английский

Citations

6

Advancing Healthcare Security: A Cutting-Edge Zero-Trust Blockchain Solution for Protecting Electronic Health Records DOI Creative Commons
Rihab Benaich, Saida El Mendili, Youssef Gahi

et al.

HighTech and Innovation Journal, Journal Year: 2023, Volume and Issue: 4(3), P. 630 - 652

Published: Sept. 1, 2023

The effective management of electronic health records (EHRs) is vital in healthcare. However, traditional systems often need help handling data inconsistently, providing limited access, and coordinating poorly across facilities. This study aims to tackle these issues using blockchain technology improve EHR systems' security, privacy, interoperability. By thoroughly analyzing blockchain's applications healthcare, we propose an innovative solution that leverages decentralized immutable nature, combined with advanced encryption techniques such as the Advanced Encryption Standard Zero Knowledge Proof Protocol, fortify systems. Our research demonstrates can effectively overcome significant challenges, including fragmented interoperability problems, by facilitating secure transparent exchange, leading enhanced coordination, care quality, cost-efficiency healthcare offers practical guidelines for implementing emphasizing a balanced approach interoperability, security. It represents advancement over systems, boosting security affording patients greater control their records. Doi: 10.28991/HIJ-2023-04-03-012 Full Text: PDF

Language: Английский

Citations

11

Predictive Patient-Centric Healthcare DOI
Ajay B. Gadicha, Vijay B. Gadicha,

Mohammad Zuhair

et al.

Advances in electronic government, digital divide, and regional development book series, Journal Year: 2024, Volume and Issue: unknown, P. 139 - 152

Published: Jan. 24, 2024

In this chapter, the authors propose a novel recommendation algorithm for patient-centric healthcare that utilizes learning applications. The aims to predict and recommend suitable applications patients based on their individual needs preferences. By leveraging machine techniques patient data, analyzes various factors such as medical history, demographics, personal interests generate personalized recommendations. This approach enhances experience by empowering actively engage in own health management education. algorithm's effectiveness is evaluated through experiments comparisons with existing methods, demonstrating its potential improve outcomes overall quality.

Language: Английский

Citations

4

GreenTech Revolution DOI
Md Mehedi Hasan Emon, Tahsina Khan, Md Adnan Rahman

et al.

Advances in environmental engineering and green technologies book series, Journal Year: 2024, Volume and Issue: unknown, P. 63 - 90

Published: Nov. 1, 2024

The GreenTech revolution is reshaping the global landscape, offering innovative solutions to pressing environmental challenges of our time. This chapter explores concept Green Technology (GreenTech), tracing its historical evolution and highlighting key sectors applications. encompasses a wide array technologies practices aimed at reducing impact, conserving natural resources, promoting sustainability across various industries, including energy, transportation, agriculture, waste management. Despite transformative potential, widespread adoption faces significant challenges, technological barriers, financial constraints, regulatory complexities, societal resistance. These obstacles, however, also present opportunities for innovation, market growth, collaboration. examines these opportunities, emphasizing role advancements, emerging markets, strategic partnerships in driving forward.

Language: Английский

Citations

3

Developing internet of things (IoT) based smart government model for Nepal DOI

Youba Raj Poudyal,

Gajendra Sharma,

Lok Bijaya Adhikari

et al.

AIP conference proceedings, Journal Year: 2025, Volume and Issue: 3224, P. 020007 - 020007

Published: Jan. 1, 2025

Language: Английский

Citations

0

Sentimental analysis using natural language processing DOI
Vikas Kumar, Abhay Bhatia, Sunil Kumar

et al.

AIP conference proceedings, Journal Year: 2025, Volume and Issue: 3224, P. 020054 - 020054

Published: Jan. 1, 2025

Language: Английский

Citations

0

Advanced Epileptic Seizure Detection Model Using Adaptive Deep Learning Technique With Coordinate Attention-Based Feature Fusion Approach DOI
Neeraj Kumari, Rajeev Kumar,

Rajiv Kumar Sharma

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 451 - 464

Published: Feb. 21, 2025

Epileptic seizures are neurological disruptions that can severely impact an individual's quality of life if left undetected or misdiagnosed. Accurate and timely detection is crucial for effective intervention management. This paper proposes Advanced Seizure Detection Model leveraging Adaptive Deep Learning Technique integrated with a Coordinate Attention-based Feature Fusion Approach. The model designed to analyze electroencephalogram (EEG) signals, which serve as critical diagnostic tool epilepsy. adaptive deep learning framework dynamically optimizes network parameters accommodate the variability in EEG signals across different patients. Attention Mechanism enhances model's ability focus on spatial temporal features, ensuring more robust representation seizure patterns.

Language: Английский

Citations

0

Cyber Security for Smart Factories Using Qualitative and Quantitative Research DOI
Ratnesh Kumar Shukla, Arvind Kumar Tiwari, Manmohan Mishra

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 213 - 230

Published: Feb. 21, 2025

It is one of today's fastest expanding industries, which makes a career in cybersecurity great opportunity. Many novices and professionals with computer science backgrounds may benefit. Cyber has become crucial for businesses organizations to navigate the future develop trust an unpredictable world. The cyber becoming clearer as shift away from tech-centric threat-focused methods focus on benefits integrating throughout organization. Cybersecurity critical business. hazards grew information technology problem business concern, so did solutions, eventually complementing strategic objectives growth. link between value impact clearer. emerged differentiator designing implementing strategies, its importance digital transformation priorities continues grow. To truly depict growing enterprises today, we polled over 1,000 global c-suite executives companies more than $500 million revenue various regions industries. Executives conduct both qualitative quantitative research hazards, company actions, future.

Language: Английский

Citations

0