Generative AI for Secure User Interface (UI) Design DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

Rehan Akbar

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 333 - 394

Опубликована: Июль 26, 2024

Generative AI, which is equipped with unique capabilities, about to put the world of secure user interface (UI) design upside down and turn it into something full endless possibilities in users will be able use same opportunities experienced solutions protect their interaction digital from any future security threats. This chapter takes a deep plunge merger generative AI design, on whole, presenting complete exposition principals involved, methodologies applied, practical embodiment, ultimate ramifications. The beginning explore building blocks UI principles user-centred iterative approach, wherein robust framework for understanding as critical part secure, intuitive, engaging experiences implemented. Further, provides an overview different types approaches that could deployed such GANs, VAEs, autoregressive models, capabilities expanding scope measures, include authentication protocols, encryption, access rights while retaining usability aesthetic appeal. Moreover, surveys instance applications support Secure GUI, among automatic generation safe layout patterns, dynamic change according emerging threats, creation cryptographic keys symbols.

Язык: Английский

Data Security and Privacy Concerns in Drone Operations DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 236 - 290

Опубликована: Янв. 26, 2024

The widespread use of drones across various industries is leading to significant transformations. However, the resulting concerns about data security and privacy are quite significant. This section offers a thorough exploration these important issues, providing insights into challenges they pose potential ways address them. Starting with an overview increasing utility drones, this chapter highlights importance strong protocols for privacy. By examining complexities collection storage, it reveals different types that gather, delves storage techniques, vulnerabilities, setting stage effective countermeasures. At core discussion cybersecurity risks, which range from cyberattacks on drone systems unauthorized access tampering data. To sum up, serves as comprehensive guide understanding, addressing, mitigating related in operations.

Язык: Английский

Процитировано

18

Eyes in the Sky DOI
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 405 - 451

Опубликована: Янв. 26, 2024

The rapid proliferation of drones across various industries necessitates a comprehensive examination the privacy and ethical implications in their cybersecurity landscape. This chapter aims to dissect address these concerns, providing valuable resource for scholars, policymakers, industry practitioners. objectives are clearly outlined, emphasizing exploration challenges considerations within context drone cybersecurity. begins by delving into associated with operations, focusing on surveillance concerns responsible collection storage sensitive data. Ethical then scrutinized, highlighting dual-use nature intricacies autonomous decision-making. A critical evaluation existing regulatory landscape governing operations frameworks is presented, shedding light effectiveness limitations.

Язык: Английский

Процитировано

12

Future Trends and Emerging Threats in Drone Cybersecurity DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 148 - 195

Опубликована: Янв. 26, 2024

The rapid proliferation of drone technology has ushered in a new era innovation and convenience across various industries. However, this technological advancement also given rise to host cybersecurity challenges that demand proactive attention. This chapter delves into the dynamic landscape security, exploring evolving trends emerging threats shape field. Beginning with an overview advancements, including integration artificial intelligence machine learning, examines their implications for cybersecurity. It then scrutinizes growing influence swarms autonomous operations, pinpointing associated strategies securing these systems. explores expansion operations beyond visual line sight (BVLOS) risks involved, emphasizing importance secure communications legal considerations.

Язык: Английский

Процитировано

11

Ethical Considerations in Drone Cybersecurity DOI
Siva Raja Sindiramutty, Chong Eng Tan,

Bhavin Shah

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 42 - 87

Опубликована: Янв. 26, 2024

The rapid proliferation of drones, coupled with their increasing integration into various aspects our lives, has brought to the forefront a myriad ethical considerations in realm cybersecurity. This chapter delves deep intricate web challenges surrounding drone cybersecurity, aiming provide comprehensive understanding this critical issue. introduction sets stage by highlighting essential role ethics emphasizing need for responsible decision-making an age where drones are omnipresent. It lays out scope, objectives, and key concepts research, underscoring contributions it makes field. core explores principles underpinning cybersecurity elucidates how these can be applied domain technology. authors delve delicate balance between security privacy, discussing implications data collection, retention, surveillance context drones.

Язык: Английский

Процитировано

10

Sustainability Metrics and Measurement in Industry 4.0-Enabled SCM DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan

и другие.

Advances in logistics, operations, and management science book series, Год журнала: 2024, Номер unknown, С. 176 - 233

Опубликована: Янв. 19, 2024

The rapid advancement of Industry 4.0 technologies has ushered in a new era supply chain management (SCM) that places sustainability at its core. This chapter goes deep into the critical intersection metrics and measurement 4.0-enabled SCM, exploring dynamic landscape where cutting-edge technology meets environmental, social, economic responsibility. Beginning with an introduction to 4.0's transformative role authors elucidate importance this context. research's scope objectives are outlined, emphasizing need decipher intricacies ecosystem. provide comprehensive elucidation key concepts, definitions, unique contributions research endeavour. A central focus is alignment SCM United Nations' Sustainable Development Goals (SDGs), illuminating how emerging can act as catalysts for achieving these global objectives.

Язык: Английский

Процитировано

2

The effect of technology-based service characteristics on relationship quality in metaverse exercise services: a questionnaire survey of bicycle simulator users in Korea DOI Creative Commons
Dong-Kyu Kim, So‐Eun Lee, Sung‐Un Park

и другие.

BMC Psychology, Год журнала: 2024, Номер 12(1)

Опубликована: Сен. 2, 2024

Язык: Английский

Процитировано

2

Security Considerations in Generative AI for Web Applications DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

N. Z. Jhanjhi

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 281 - 332

Опубликована: Июль 26, 2024

Protecting AI in web applications is necessary. This domain a composite of technology and huge scope with good prospects immense difficulties. chapter covers the landscape security issues advancing generative techniques for integration into development frameworks. The initial section on development—a conversation subtleties AI-based methods. In literal stance, offers 13 ways to approach it. Among threats are those that introduce related deployments, which illustrate why it vital defenders infrastructure owners implement mitigation measures proactively. pertains privacy data lessons securing preventing vulnerability. explores attacks, model poisoning, bias issues, defence mechanisms, long-term strategies. Additionally, Service A promotes transparency, explainability, compliance applicable laws while structuring methodology deployment methods/operation. text outlines how respond recover from incidents as provides response frameworks everyone involved managing breaches. Finally, addresses trends, possible threats, learned real-world case studies. order contribute addressing these research needs, this sheds light considerations associated suggests recommendations can help researchers, practitioners, policymakers enhance posture popular advancements used generating applications.

Язык: Английский

Процитировано

2

Sustainability in the Digital Age DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan

и другие.

Advances in logistics, operations, and management science book series, Год журнала: 2024, Номер unknown, С. 89 - 132

Опубликована: Янв. 19, 2024

This chapter explores the convergence of Industry 4.0 technologies and sustainable supply chain practices, presenting a comprehensive overview these digital advancements' transformative potential. The begins by defining intersection between sustainability 4.0, emphasizing pivotal role in fostering environmentally socially responsible chains. With clear objectives mind, exploration delves into impact key on practices. discussion spans utilization internet things (IoT) for real-time monitoring, big data analytics informed decision-making, integration robotics to enhance ethical manufacturing.

Язык: Английский

Процитировано

1

Overview of Generative AI Techniques for Cybersecurity DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

Rehan Akbar

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 1 - 52

Опубликована: Июль 26, 2024

Generative AI techniques have been popular since they can generate data or content that could be hardly distinguished from genuine ones. This chapter comprehensively reviews generative for cybersecurity and its definition, history, applications in different fields. It covers basic ideas such as models, probability distributions, latent spaces. Also, it goes into more detail on some of the approaches like GANs, VAEs, combination RL. The explores structure training processes GANs VAEs demonstrates their application tasks image synthesis, enhancement, novelty detection. interaction between RL models challenges, including exploration-exploitation trade-off. focuses development with help DL analyses benefits deep usage various Evaluation measures problems measuring are discussed, focusing methods improving measurement accuracy. Finally, new directions, transformer-based self-supervised learning, to look at future AI. emphasis is made understanding these due versatility, about possible further developments findings other fields studies provided.

Язык: Английский

Процитировано

1

Generative AI for Secure User Interface (UI) Design DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

Rehan Akbar

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 333 - 394

Опубликована: Июль 26, 2024

Generative AI, which is equipped with unique capabilities, about to put the world of secure user interface (UI) design upside down and turn it into something full endless possibilities in users will be able use same opportunities experienced solutions protect their interaction digital from any future security threats. This chapter takes a deep plunge merger generative AI design, on whole, presenting complete exposition principals involved, methodologies applied, practical embodiment, ultimate ramifications. The beginning explore building blocks UI principles user-centred iterative approach, wherein robust framework for understanding as critical part secure, intuitive, engaging experiences implemented. Further, provides an overview different types approaches that could deployed such GANs, VAEs, autoregressive models, capabilities expanding scope measures, include authentication protocols, encryption, access rights while retaining usability aesthetic appeal. Moreover, surveys instance applications support Secure GUI, among automatic generation safe layout patterns, dynamic change according emerging threats, creation cryptographic keys symbols.

Язык: Английский

Процитировано

0