Ethics and Transparency in Secure Web Model Generation DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

N. Z. Jhanjhi

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 411 - 464

Published: July 26, 2024

The chapter discusses how ethics and transparency relate to creating secure web models for AI. AI plays a role in development, the authors consider as two critical aspects of this subject, which influences users, stakeholders, or society. examination begins with principles, include fairness, accountability, privacy requirements. They then get into problems models. In chapter, they break down bias fairness concerns at source find ways resolve them This relates trust where explainability are highlighted. also provide case studies showing effectiveness transparent explainable increasing user engagement. delve decision-making frameworks help navigate ethical dilemmas development. It represents conversation on atmospherics empowerment tools, such monitoring evaluation guidelines mobilisation implementation practice governance. To sum up, underline views us do AI-driven Therefore, urge all stakeholders make cornerstones responsible webs.

Language: Английский

Progress and Obstacles in Cloud Computing for Healthcare DOI

Abu Jor Al Gefari,

Imran Hasan,

Md Amin Ullah Sheikh

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 347 - 368

Published: Feb. 14, 2025

Since the invention of Internet Things (IoT), people are seeing a new world in healthcare. The rapid growth IoT has brought with it solutions to dilemmas and few challenges cloud devices. But keeping mind benefits these devices, need be solved efficiency security. Putting place storage analysis for specific periods is very popular medicine. On other hand, creating big data, considering sensitivity, some limitations have accepted. use latency, throughput, bandwidth increases cost Internet. Numerous alternative paradigms, most notably edge computing fog computing, evolved solve shortcomings. Consequently, studies shown an increase hybrid based.

Language: Английский

Citations

0

Future Trends in AI Security DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 229 - 262

Published: Feb. 14, 2025

Cybersecurity is enriched due to Artificial Intelligence (AI), which provides better real-time threat detection and anomaly identification, response systems. As attackers grow more sophisticated leverage AI in creating malware. The present study gives an overview of the future threats associated with AI-driven attacks challenges faced by existing cybersecurity countermeasures. Additionally, it also analyses feasibility using capabilities like predictive intelligence, advanced quantum computing for some these emerging threats. For such as, we need user permissions rights on this application, should take into consideration privacy policies while designing security as well. To end, get ready against risks a proactive adaptive approach needed stressing collaboration between industry, academia well global entities.

Language: Английский

Citations

0

Blockchain in Cybersecurity Enhancing Data Integrity and Transaction Security DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Sayan Kumar Ray

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 40

Published: Feb. 14, 2025

The technology is becoming a little more widely known with its data security and hyper-transaction reliability. By very design of decentralization implementation cryptographic principles to maintain integrity, blockchain eliminates central points failure making tampering unauthorized changes virtually impossible as well. This part the diary will discuss how giving our financial transactions, providing safety identities agreements seamless smart contracts. From healthcare supply chain management, it amazing witness many industries are beginning incorporate decree validity information, prevent fraud. But you know what they say — new tech has ways break. ride been accompanied by scalability challenges, energy consumption worries, regulation problems so on. There also some promising prospects, quantum-resistant algorithms enhanced interoperability may resolve these widen blockchain's influence.

Language: Английский

Citations

0

Cybersecurity in IoT Ecosystems Managing Device Vulnerabilities and Data Exposure DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Sayan Kumar Ray

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 63 - 98

Published: Feb. 14, 2025

The proliferation of IoT devices and sensors leads to greater efficiency but also greatly increased attack surfaces. In this part the series, we delve into some key security issues that plague ecosystems with a solution- understanding device vulnerabilities how they led data exposure. are frequently built without strong defences in place, lack secure firmware combined weak authentication making them top list for attackers. We will turn real-world threats, such as distributed denial service (DDoS) attacks launched by botnets breaches disclose personal information or sensitive business information. Although chapter certainly warns risks, it is no means doom-and-gloom line reasoning. paper outlines best practices systems, from security-by-design principles leveraging AI blockchain technologies.

Language: Английский

Citations

0

Current Security Issues and Vulnerabilities Associated With Mobile Application DOI

Abdullahi Adewole Zakariyah,

Muhammand Intizar Ali,

Nima Yoezer

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 41 - 62

Published: Feb. 14, 2025

Mobile applications have become a crucial part of modern life, facilitating everything from social interactions to financial transactions. However, this ubiquity also presents significant security challenge. The landscape mobile app is fraught with vulnerabilities and threats that can compromise user data, privacy, the overall integrity applications. This paper delves into issues affect It provides an in-depth analysis various attack methods used by cybercriminals extract data explores how users protect their information being compromised. discussion will cover common tactics employed attackers, potential consequences losing application these threats, critical measures necessary for safeguarding against such attacks.

Language: Английский

Citations

0

Security Considerations in Generative AI for Web Applications DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

N. Z. Jhanjhi

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 281 - 332

Published: July 26, 2024

Protecting AI in web applications is necessary. This domain a composite of technology and huge scope with good prospects immense difficulties. chapter covers the landscape security issues advancing generative techniques for integration into development frameworks. The initial section on development—a conversation subtleties AI-based methods. In literal stance, offers 13 ways to approach it. Among threats are those that introduce related deployments, which illustrate why it vital defenders infrastructure owners implement mitigation measures proactively. pertains privacy data lessons securing preventing vulnerability. explores attacks, model poisoning, bias issues, defence mechanisms, long-term strategies. Additionally, Service A promotes transparency, explainability, compliance applicable laws while structuring methodology deployment methods/operation. text outlines how respond recover from incidents as provides response frameworks everyone involved managing breaches. Finally, addresses trends, possible threats, learned real-world case studies. order contribute addressing these research needs, this sheds light considerations associated suggests recommendations can help researchers, practitioners, policymakers enhance posture popular advancements used generating applications.

Language: Английский

Citations

2

Generative AI for Threat Hunting and Behaviour Analysis DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi,

Rehan Akbar

et al.

Advances in digital crime, forensics, and cyber terrorism book series, Journal Year: 2024, Volume and Issue: unknown, P. 235 - 286

Published: Sept. 12, 2024

Cyber threats are becoming more advanced, and so is cybersecurity, which getting intellectual better at hiding its presence. The requirement to achieve the balance between proactive resistive threat-hunting measures in this dynamic environment very high. Part four outlines how new AI techniques enable design of existing processes for hunting potential threats. main objective digress into core principles threat hunting, starting from being including scenarios deducing clues based on hypothesis. Then, authors will highlight limitations conventional methods detecting gimmicks that fool even skilled hunters with an unseen smoking hiddenly a never-ending evolutionary process. Two well-studied approaches tackling these challenges generative models like adversarial networks (GANs) variational autoencoders (VAEs).

Language: Английский

Citations

1

Generative AI for Threat Intelligence and Information Sharing DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

N. Z. Jhanjhi

et al.

Advances in digital crime, forensics, and cyber terrorism book series, Journal Year: 2024, Volume and Issue: unknown, P. 191 - 234

Published: Sept. 12, 2024

Collaboration in providing threat intelligence and disseminating information enables cyber security professionals to embrace digital most successfully, whose risks are ever-changing. This article dwells on the capacity of machine change by categorising indicators compromise (IOC) actors, then highlights limits traditional methods. Among Artificial tools such as generative adversarial networks (GANs) Variational autoencoders (VAEs), which key innovators, one can create synthetic or fake data that emulates real attack scenarios past. allows cyber-related be analysed differently from before. In addition, this feature secure stakeholder collaborations. It is also meant mainly for factual protects private but exchange helpful information. clear fact showcasing real-world examples demonstrates Al's automation through cybersecurity detection.

Language: Английский

Citations

1

Generative AI in Network Security and Intrusion Detection DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

N. Z. Jhanjhi

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 77 - 124

Published: July 26, 2024

Protecting virtual assets from cyber threats is essential as we live in a digitally advanced world. Providing responsible emphasis on proper network security and intrusion detection imperative. On the other hand, traditional strategies need supportive tool to adapt transforming threat space. New generative AI techniques like adversarial networks (GANs) variational autoencoders (VAEs) are mainstream technologies required meet gap. This chapter deals with how these models can enhance by inspecting traffic for anomalies malicious behaviors detected through unsupervised learning, which considers strange or emerging phenomena. survey features innovations fault detection, behavior control, deep packet inspection, classification, examples of real-world intrusions GAN-based systems. Furthermore, focuses challenges attacks that require development solid defense mechanisms, such networks. Ethics becomes following matter our list discussions, given privacy transparency accountability be observed when working security. Finally, authors examine trends determine cyber-attacks dealt comprehensively.

Language: Английский

Citations

1

Integration of IoT With Robotics and Drones DOI
Brij B. Gupta, Jinsong Wu

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 33 - 54

Published: Dec. 13, 2024

This chapter explores the synergistic integration of internet things (IoT) with robotics and drones, highlighting how this convergence is revolutionizing industrial operations capabilities. It delves into mechanisms through which IoT devices sensors enhance autonomy, efficiency, intelligence robotic systems enabling real-time data exchange analysis. The discusses implementation for advanced monitoring, predictive maintenance, seamless operational control, illustrating its impact practical examples across various sectors. also addresses challenges scalability, security, interoperability, presenting forward-looking strategies to navigate these hurdles. By emphasizing transformative potential in augmenting capabilities underscores pivotal role driving innovation excellence digital age.

Language: Английский

Citations

1