Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 257 - 284
Published: Dec. 13, 2024
This
chapter
provides
an
in-depth
study
at
the
latest
developments
in
deep
reinforcement
learning
(DRL)
as
applied
to
drones
and
unmanned
aerial
vehicles
(UAVs),
with
a
focus
on
safety
standards
overcoming
challenges
like
object
detection
cybersecurity.
Real-world
instances
across
sectors
demonstrate
how
DRL
significantly
improves
efficiency
adaptability
autonomous
systems.
By
contrasting
various
techniques,
highlights
their
effectiveness
potential
advance
drone
UAV
capabilities.
The
practical
implications
advantages
of
applications
are
emphasized,
showcasing
transformative
influence
industries.
Moreover,
explores
future
research
paths
stimulate
innovation
enhance
self-piloting
vehicle
technology.
In
essence,
it
thorough
overview
DRL's
role
operations,
underscoring
importance
standards,
capacity
boost
systems,
its
contribution
evolving
technology
landscape.
Cyber Security and Applications,
Journal Year:
2024,
Volume and Issue:
2, P. 100046 - 100046
Published: Jan. 1, 2024
Ambient
intelligence
technologies
have
the
potential
to
transform
healthcare
by
providing
personalized,
context-aware,
and
proactive
support
for
patients
providers.
However,
use
of
these
in
settings
raises
important
privacy
security
concerns
that
must
be
addressed
ensure
patient
trust
acceptance.
This
paper
explores
considerations
related
utilization
ambient
healthcare,
aiming
address
associated
risks
establish
a
robust
infrastructure.
By
reviewing
inherent
employing
intelligence,
discussing
ethical
legal
considerations,
proposing
mitigation
strategies,
focus
is
on
ensuring
acceptance.The
architecture
being
presented
comprehensive
one
with
interconnected
layers
guarantees
data
confidentiality,
integrity,
system.
protects
sensitive
maintains
its
continuous
availability.
research
helps
safe
environment
supports
transformational
while
putting
protection
first
thoroughly
addressing
concerns.
Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 131 - 164
Published: July 12, 2024
With
the
rise
and
development
of
quantum
computing,
there
is
a
high
scope
in
encryption
methods
increasing
security
integrity
data
manyfolds.
To
safeguard
user's
data,
safe
cryptography
needs
to
be
implemented
different
aspects
transmission
data.
This
study
takes
algorithms
into
account
that
are
being
used
for
discusses
how
they
can
current
industries
systems.
chapter
examines
algorithms—lattice-based,
hash-based,
code-based—assessing
their
pros
cons
against
threats.
It
explores
impact
on
finance,
healthcare,
government,
implementation
challenges
such
as
performance
compatibility.
The
need
global
standardization
collaboration
widespread
adoption
also
explored.
Journal of High Speed Networks,
Journal Year:
2024,
Volume and Issue:
30(3), P. 477 - 496
Published: May 17, 2024
Due
to
increasing
advancements
in
the
field
of
technology
agricultural
sector
is
experiencing
a
drastic
change,
this
paradigm
shift
result
integrating
technologies
like
Industry
5.0,
Society
Internet
Things
(IoT),
Artificial
Intelligence
(AI),
and
Remote
Sensing.
The
integration
these
helps
multiple
aspects
such
as
IoT
sensors
help
real-time
data
monitoring
which
includes
parameters
soil
conditions,
meteorological
aspects„the
valuable
insights
about
overall
crop
health,
also
promoting
informed
decision-making
agriculture.
Cognitive
systems
revolutionize
manufacturing
processes,
enabling
predictive
maintenance,
analyses,
autonomous
for
increased
production
efficiency.
Implementing
digital
twin
further
boosts
transformation
process
by
creating
dynamic
representations
systems.
Digital
twins
simplify
complex
interactions
farmers
obtained
from
diverse
sources.
This
paper
explores
relationship
between
smart
farming
practices,
implementation
latest
techniques
IoT,
twins,
understanding
their
impact
on
precision
agriculture,
sustainable
farming,
In
conclusion,
study
demonstrates
how
5.0
technologies,
including
technology,
possess
potential
operations,
enhance
yields,
foster
sustainability,
prepare
agriculture
challenges
rapidly
changing
global
environment.
Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 241 - 269
Published: July 12, 2024
Homomorphic
encryption
is
like
a
secret
code
that
allows
us
to
do
calculations
on
private
information
without
actually
seeing
the
details.
This
super
important
for
keeping
things
while
still
getting
useful
insights.
chapter
discusses
how
homomorphic
can
be
implemented
into
smart
city
infrastructure.
Furthermore,
research
investigates
potential
of
and
blockchain
technology
integration
make
cities
even
more
secure.
explores
impact
privacy
in
cities.
It
examines
legal
technological
factors
at
play,
considering
regulations
both
help
hinder
use
this
technology.
Ultimately,
it
argues
key
balancing
utility,
essential
success
initiatives.
Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 376 - 404
Published: July 12, 2024
In
the
era
of
cryptographic
advancement,
integrating
human
workflow
with
technology
is
a
natural
progression.
Traditionally,
advancements
have
focused
on
mathematical
robustness
and
computational
security.
This
research
delves
into
combining
methods
to
explore
foundations
visual
cryptography
its
practical
implementation
in
decrypting
sensitive
information.
Challenges
related
usability,
such
as
complex
concepts,
key
management,
user
authentication,
cross-platform
compatibility,
social
engineering
attacks,
balancing
privacy
functionality,
are
evaluated
proposed
solutions
across
various
domains.
Additionally,
study
suggests
enhance
accessibility
tools,
including
iterative
design
processes,
research,
user-friendly
interfaces,
error
handling.
Visual
cryptography,
leveraging
capabilities
system,
presents
unique
approach
data
decryption
that
circumvents
traditional
reliance
algorithms.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 159 - 186
Published: Dec. 13, 2024
Exploring
the
intersection
of
transparency
and
security
in
autonomous
systems,
this
chapter
examines
dynamic
landscape
industrial
robots
intelligent
drones.
Advanced
technologies
such
as
machine
learning,
AI,
robotics,
deep
learning
shape
intricate
domain.
As
systems
gain
prominence
across
sectors,
a
focus
lies
on
understanding
decision-making
frameworks.
Methodologies
for
achieving
algorithmic
strengthening
protocols
are
outlined,
emphasizing
fusion
technological
innovation
with
ethical
considerations.
Real-world
case
studies
offer
practical
insights
best
practices.
Ethical
responsibilities
AI
robotics
integration
emphasized,
alongside
forward-looking
view
emerging
trends
technologies,
providing
tailored
roadmap
researchers,
practitioners,
enthusiasts
navigating
evolving
realm
systems.
This
provides
thorough
analysis
challenges
opportunities
benefiting
policymakers
industry
stakeholders.
IGI Global eBooks,
Journal Year:
2025,
Volume and Issue:
unknown, P. 187 - 212
Published: Feb. 14, 2025
Phishing
attacks
are
a
major
cybersecurity
threat,
exploiting
human
vulnerabilities
by
manipulating
trust
to
access
sensitive
information.
As
phishing
tactics
evolve,
the
demand
for
advanced
anti-phishing
technologies
has
surged.
This
paper
examines
key
measures
such
as
email
filters,
SSL/TLS
certificates,
DNS-based
authentication,
multi-factor
and
URL
filtering
protect
against
phishing.
Advanced
methods
like
machine
learning,
AI-driven
analysis,
real-time
threat
detection
have
improved
prevention.
It
also
discusses
browser-based,
cloud-based,
security
tools
mitigating
risks.
The
highlights
challenges
evolving
tactics,
limitations,
user
negligence,
emphasizing
need
ongoing
innovation
in
strategies.
Future
trends
AI,
biometrics,
deep
learning
intelligence
explored,
showing
potential
enhance
defense.
A
holistic
approach
integrating
technology,
protocols,
awareness
is
advocated
combat
effectively
at
both
individual
organizational
levels.
IGI Global eBooks,
Journal Year:
2025,
Volume and Issue:
unknown, P. 1 - 24
Published: Feb. 14, 2025
Phishing
remains
a
significant
cybersecurity
threat,
targeting
individuals
and
organizations
to
access
confidential
data.
As
techniques
evolve,
innovative
protective
measures
are
essential.
This
paper
offers
detailed
overview
of
phishing
defense
strategies,
focusing
on
both
technological
solutions
human-centered
approaches.
Multi-layered
defenses,
blending
traditional
security
with
user
education,
vital
for
mitigating
risks.
Simulated
exercises
ongoing
training
empower
employees
recognize
respond
threats,
strengthening
the
human
aspect
cybersecurity.
Leadership
commitment
open
communication
crucial
cultivating
strong
culture,
encouraging
staff
report
suspicious
activities.
Continuous
evaluation
updates
defenses
necessary
adapt
evolving
threats.
Real-world
case
studies,
such
as
2020
Twitter
breach
SolarWinds
attack,
highlight
severe
impacts
phishing,
reinforcing
need
proactive
that
combines
technology,
risk
management
protect
digital
assets
effectively.