Mathematics,
Journal Year:
2024,
Volume and Issue:
12(22), P. 3602 - 3602
Published: Nov. 18, 2024
In
contemporary
wildlife
conservation,
drones
have
become
essential
for
the
non-invasive
monitoring
of
animal
populations
and
habitats.
However,
sensitive
data
captured
by
drones,
including
images
videos,
require
robust
encryption
to
prevent
unauthorized
access
exploitation.
This
paper
presents
a
novel
algorithm
designed
specifically
safeguarding
data.
The
proposed
approach
integrates
one-dimensional
two-dimensional
memory
cellular
automata
(1D
MCA
2D
MCA)
with
bitwise
XOR
operation
as
an
intermediate
confusion
layer.
MCA,
guided
chaotic
rules
from
sine-exponential
(SE)
map,
utilizes
varying
neighbor
configurations
enhance
both
diffusion
confusion,
making
more
resilient
attacks.
A
final
layer
1D
controlled
pseudo-random
number
generators,
ensures
comprehensive
across
image.
SHA-256
hash
input
image
is
used
derive
parameters,
providing
resistance
against
plaintext
Extensive
performance
evaluations
demonstrate
effectiveness
scheme,
which
balances
security
complexity
while
outperforming
existing
algorithms.
The Aeronautical Journal,
Journal Year:
2025,
Volume and Issue:
unknown, P. 1 - 19
Published: March 3, 2025
Abstract
In
recent
years,
the
rapid
convergence
of
artificial
intelligence
(AI)
and
low-altitude
flight
technology
has
driven
significant
transformations
across
various
industries.
These
advancements
have
showcased
immense
potential
in
areas
such
as
logistics
distribution,
urban
air
mobility
(UAM)
national
defense.
By
adopting
AI
technology,
can
achieve
high
levels
automation
operate
coordinated
swarms,
thereby
enhancing
efficiency
precision.
However,
these
technologies
become
more
pervasive,
they
also
raise
pressing
ethical
or
moral
concerns,
particularly
regarding
privacy,
public
safety,
well
risks
militarisation
weaponisation.
issues
sparked
extensive
debates.
summary,
while
integration
presents
revolutionary
opportunities,
it
introduces
complex
challenges.
This
article
will
explore
opportunities
challenges
depth,
focusing
on
privacy
protection,
military
applications
legal
regulation,
propose
strategies
to
ensure
that
technological
remain
aligned
with
principles.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 347 - 368
Published: Feb. 14, 2025
Since
the
invention
of
Internet
Things
(IoT),
people
are
seeing
a
new
world
in
healthcare.
The
rapid
growth
IoT
has
brought
with
it
solutions
to
dilemmas
and
few
challenges
cloud
devices.
But
keeping
mind
benefits
these
devices,
need
be
solved
efficiency
security.
Putting
place
storage
analysis
for
specific
periods
is
very
popular
medicine.
On
other
hand,
creating
big
data,
considering
sensitivity,
some
limitations
have
accepted.
use
latency,
throughput,
bandwidth
increases
cost
Internet.
Numerous
alternative
paradigms,
most
notably
edge
computing
fog
computing,
evolved
solve
shortcomings.
Consequently,
studies
shown
an
increase
hybrid
based.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 229 - 262
Published: Feb. 14, 2025
Cybersecurity
is
enriched
due
to
Artificial
Intelligence
(AI),
which
provides
better
real-time
threat
detection
and
anomaly
identification,
response
systems.
As
attackers
grow
more
sophisticated
leverage
AI
in
creating
malware.
The
present
study
gives
an
overview
of
the
future
threats
associated
with
AI-driven
attacks
challenges
faced
by
existing
cybersecurity
countermeasures.
Additionally,
it
also
analyses
feasibility
using
capabilities
like
predictive
intelligence,
advanced
quantum
computing
for
some
these
emerging
threats.
For
such
as,
we
need
user
permissions
rights
on
this
application,
should
take
into
consideration
privacy
policies
while
designing
security
as
well.
To
end,
get
ready
against
risks
a
proactive
adaptive
approach
needed
stressing
collaboration
between
industry,
academia
well
global
entities.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 1 - 40
Published: Feb. 14, 2025
The
technology
is
becoming
a
little
more
widely
known
with
its
data
security
and
hyper-transaction
reliability.
By
very
design
of
decentralization
implementation
cryptographic
principles
to
maintain
integrity,
blockchain
eliminates
central
points
failure
making
tampering
unauthorized
changes
virtually
impossible
as
well.
This
part
the
diary
will
discuss
how
giving
our
financial
transactions,
providing
safety
identities
agreements
seamless
smart
contracts.
From
healthcare
supply
chain
management,
it
amazing
witness
many
industries
are
beginning
incorporate
decree
validity
information,
prevent
fraud.
But
you
know
what
they
say
—
new
tech
has
ways
break.
ride
been
accompanied
by
scalability
challenges,
energy
consumption
worries,
regulation
problems
so
on.
There
also
some
promising
prospects,
quantum-resistant
algorithms
enhanced
interoperability
may
resolve
these
widen
blockchain's
influence.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 63 - 98
Published: Feb. 14, 2025
The
proliferation
of
IoT
devices
and
sensors
leads
to
greater
efficiency
but
also
greatly
increased
attack
surfaces.
In
this
part
the
series,
we
delve
into
some
key
security
issues
that
plague
ecosystems
with
a
solution-
understanding
device
vulnerabilities
how
they
led
data
exposure.
are
frequently
built
without
strong
defences
in
place,
lack
secure
firmware
combined
weak
authentication
making
them
top
list
for
attackers.
We
will
turn
real-world
threats,
such
as
distributed
denial
service
(DDoS)
attacks
launched
by
botnets
breaches
disclose
personal
information
or
sensitive
business
information.
Although
chapter
certainly
warns
risks,
it
is
no
means
doom-and-gloom
line
reasoning.
paper
outlines
best
practices
systems,
from
security-by-design
principles
leveraging
AI
blockchain
technologies.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 41 - 62
Published: Feb. 14, 2025
Mobile
applications
have
become
a
crucial
part
of
modern
life,
facilitating
everything
from
social
interactions
to
financial
transactions.
However,
this
ubiquity
also
presents
significant
security
challenge.
The
landscape
mobile
app
is
fraught
with
vulnerabilities
and
threats
that
can
compromise
user
data,
privacy,
the
overall
integrity
applications.
This
paper
delves
into
issues
affect
It
provides
an
in-depth
analysis
various
attack
methods
used
by
cybercriminals
extract
data
explores
how
users
protect
their
information
being
compromised.
discussion
will
cover
common
tactics
employed
attackers,
potential
consequences
losing
application
these
threats,
critical
measures
necessary
for
safeguarding
against
such
attacks.
Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 491 - 522
Published: July 26, 2024
The
chapter
presents
a
comprehensive
exploration
of
the
changing
dynamics
at
intersection
between
rapidly
growing
landscape
interconnectivity
various
devices—the
internet
things—and
innovations
piloted
by
advancements
in
generative
artificial
intelligence.
In
following
background-focused
analysis,
significance
enactment
new
levels
security
details
this
fast-growing
and
virulently
expansive
is
emphasized,
with
AI
ultimately
serving
as
highlight.
conversation
consequently
shifts
to
threats.
This
includes
detailed
depiction
cybersecurity
threats
rooted
AI,
featuring
malicious
actors
incidents,
such
increasingly
popular
phenomenon
ransomware-as-a-service
mirror
illustrations
dynamic
multifaceted
character
these
class
further
proceeds
more
in-depth
detail
about
most
contemporary
platforms
adversarial
networks,
variational
autoencoders,
reinforcement
learning—all
relevant
identifying
emerging
solutions
advance
strategies
cybersecurity.
simultaneously
conducts
an
opportunity
threat
analysis
merger
regard
ethics,
regulations,
overall
touchpoints
tactics.
concludes
call
for
unity
discourse
action
industry,
academia,
government
stakeholders
summary
essential
cross-disciplinary
aspect
that
must
drive
narrative
confronting
overcoming
from
research.
Having
presented
structure,
has
allowed
coverage
major
issues
opportunities
heart
cybersecurity-generative
combination.
Additionally,
it
provided
forum
collaborative
fortified
efforts
regarding
securing
defending
uncertainties
unpredictable
digital
store
world.
Proceedings of the Institution of Mechanical Engineers Part C Journal of Mechanical Engineering Science,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Sept. 22, 2024
Swarm
Robotics
(SR)
is
an
interdisciplinary
field
that
rapidly
advancing
to
address
complex
industrial
challenges.
This
paper
provides
a
comprehensive
review
of
recent
advancements
and
emerging
trends
in
SR,
with
specific
focus
on
the
coordination
control
Flying
Robots
(SFRs).
The
motivation
behind
this
explore
scalable
robust
solutions
for
SFRs
enhance
their
performance
adaptability
across
various
applications.
Key
objectives
include
examining
characteristics
essential
behaviors
analyzing
challenges
so
lutions
implementing
SR
(FRs),
highlighting
current
future
research
directions.
delves
into
critical
areas
such
as
multiple
robot
path
planning,
Intelligence
(SI),
combinatorial
optimization,
formation
flying
using
SFR.
Special
attention
given
techniques,
including
GPS-denied
environments,
underscore
significance
SR.
also
addresses
ethical,
privacy,
security
considerations,
emphasizing
importance
responsible
practices
development.
Major
takeaways
from
identification
key
technical
potential
SFR,
exploration
SI
algorithms,
directions
necessary
fully
realizing
technologies.
By
offering
detailed
insights
state-of-the-art
its
implications,
serves
foundational
guide
studies
dynamic
promising
domain
swarm
robotics.