Enhancing Named Entity Recognition (NER) in Biomedical Texts: BIOBERT on CORD-19 Data set
Sampathirao Suneetha,
No information about this author
Jarubula Ramu,
No information about this author
Neerukonda Kanthi Priyadarsini
No information about this author
et al.
Lecture notes in networks and systems,
Journal Year:
2025,
Volume and Issue:
unknown, P. 355 - 365
Published: Jan. 1, 2025
Language: Английский
Comparative Analysis of Brain Tumor Classification Using AI Techniques
Prathipati Silpa Chaitanya,
No information about this author
Susanta Kumar Satpathy
No information about this author
Lecture notes in networks and systems,
Journal Year:
2025,
Volume and Issue:
unknown, P. 422 - 433
Published: Jan. 1, 2025
Language: Английский
Secured File-Sharing: Hybrid Encryption and Network Theory for Enhanced Privacy
A. Siva Sankar,
No information about this author
A. S. Akshay,
No information about this author
K. M. Ananthakrishnan
No information about this author
et al.
Lecture notes in networks and systems,
Journal Year:
2025,
Volume and Issue:
unknown, P. 141 - 150
Published: Jan. 1, 2025
Language: Английский
Enhancing Front‐End Security: Protecting User Data and Privacy in Web Applications
Oleksandr Tkachenko,
No information about this author
Valery Goncharov,
No information about this author
Przemysław Jatkiewicz
No information about this author
et al.
Computer Animation and Virtual Worlds,
Journal Year:
2024,
Volume and Issue:
35(6)
Published: Nov. 1, 2024
ABSTRACT
Conducting
research
on
this
subject
remains
relevant
in
light
of
the
rapid
development
technology
and
emergence
new
threats
cybersecurity,
requiring
constant
updating
knowledge
protection
methods.
The
purpose
study
is
to
identify
effective
front‐end
security
methods
technologies
that
help
ensure
user
data
their
privacy
when
using
web
applications
or
sites.
A
methodology
defines
steps
processes
for
developed.
identifies
primary
threats,
including
cross‐site
scripting
(XSS),
request
forgery
(CSRF),
SQL
injections,
evaluates
existing
such
as
Content
Security
Policy
(CSP),
HTTPS,
authentication,
authorization
mechanisms.
findings
highlight
effectiveness
these
measures
mitigating
risks,
providing
a
clear
assessment
advantages
limitations.
Key
recommendations
developers
include
integration
modern
protocols,
regular
updates,
comprehensive
training.
This
offers
practical
insights
improve
enhance
an
evolving
digital
landscape.
Language: Английский