期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles 被引量:1
1
作者 Joe Mutebi Margaret Kareyo +1 位作者 Umezuruike Chinecherem Akampurira Paul 《Journal of Computer and Communications》 2022年第8期41-63,共23页
The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security ... The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security principles. The study followed literature search techniques, as well as theoretical and empirical methods of factor validation. The strategy used in literature search includes Boolean keywords search, and citation guides, using mainly web of science databases. As guided by study objectives, 9 SM socio-technical factors were identified, verified and validated. Both theoretical and empirical validation processes were followed. Thus, a theoretical validity test was conducted on 45 Likert scale items, involving 10 subject experts. From the score ratings of the experts, Content Validity Index (CVI) was calculated to determine the degree to which the identified factors exhibit appropriate items for the construct being measured, and 7 factors attained an adequate level of validity index. However, for reliability test, 32 respondents and 45 Likert scale items were used. Whereby, Cronbach’s alpha coefficient (α-values) were generated using SPSS. Subsequently, 8 factors attained an adequate level of reliability. Overall, the validated factors include;1) usability—visibility, learnability, and satisfaction;2) education and training—help and documentation;3) SM technology development—error handling, and revocability;4) information security —security, privacy, and expressiveness. In this case, the confirmed factors would add knowledge by providing a theoretical basis for rationalizing information security requirements on SM usage. 展开更多
关键词 Social Media Usage Information Security Factors Cyber Security Socio-Technical Usable-Security
在线阅读 下载PDF
Development of Web Mapping Application for Spatial Ecotourism Information Using QGIS Plugin and Freely Available Web Platforms in North West Highlands of Ethiopia a Case Study: Chokie Mountain Watersheds 被引量:1
2
作者 Mengesha Endalew Wobetu Shiferaw Abinet Kindie 《Advances in Internet of Things》 2019年第3期50-61,共12页
Ecotourism is a sustainable, green and smokeless industry of the society by providing alternative source to the livelihood and local community, in order to re-naturalize the environment to bring the man closer to the ... Ecotourism is a sustainable, green and smokeless industry of the society by providing alternative source to the livelihood and local community, in order to re-naturalize the environment to bring the man closer to the natural environment. The use of web application has changed the way tourists gather information about tourist attraction spots of the research area. The aim of the study is to assess and identify ecotourism attraction sites of Chokie Mountain watersheds for touristic activities to develop a web-based GIS mapping portal for the improvement of nature-based ecotourism activities. The web-based GIS portal for Web Mapping Application is available for the user with the skills necessary to create standard web mapping services. We have implemented web mapping services based on formal cartographic visualization rules in the open source QGIS software and threejs JavaScript plugin. Threejs plugin is used for 3D visualization, interaction and export terrain data, map canvas image and vector data to HTML page and JS. The result of web-based GIS portal supports spatial and non-spatial database of tourist attraction and tourist service data with attractive user interface. 展开更多
关键词 ECOTOURISM Chokie MOUNTAIN Watersheds SPATIAL Mapping Qgis Open Source Software Qgis2threejs Plugins
暂未订购
LinguTimeX a Framework for Multilingual CTC Detection Using Explainable AI and Natural Language Processing
3
作者 Omar Darwish Shorouq Al-Eidi +4 位作者 Abdallah Al-Shorman Majdi Maabreh Anas Alsobeh Plamen Zahariev Yahya Tashtoush 《Computers, Materials & Continua》 2026年第1期2231-2251,共21页
Covert timing channels(CTC)exploit network resources to establish hidden communication pathways,posing signi cant risks to data security and policy compliance.erefore,detecting such hidden and dangerous threats remain... Covert timing channels(CTC)exploit network resources to establish hidden communication pathways,posing signi cant risks to data security and policy compliance.erefore,detecting such hidden and dangerous threats remains one of the security challenges. is paper proposes LinguTimeX,a new framework that combines natural language processing with arti cial intelligence,along with explainable Arti cial Intelligence(AI)not only to detect CTC but also to provide insights into the decision process.LinguTimeX performs multidimensional feature extraction by fusing linguistic attributes with temporal network patterns to identify covert channels precisely.LinguTimeX demonstrates strong e ectiveness in detecting CTC across multiple languages;namely English,Arabic,and Chinese.Speci cally,the LSTM and RNN models achieved F1 scores of 90%on the English dataset,89%on the Arabic dataset,and 88%on the Chinese dataset,showcasing their superior performance and ability to generalize across multiple languages. is highlights their robustness in detecting CTCs within security systems,regardless of the language or cultural context of the data.In contrast,the DeepForest model produced F1-scores ranging from 86%to 87%across the same datasets,further con rming its e ectiveness in CTC detection.Although other algorithms also showed reasonable accuracy,the LSTM and RNN models consistently outperformed them in multilingual settings,suggesting that deep learning models might be better suited for this particular problem. 展开更多
关键词 Arabic language Chinese language covert timing channel CYBERSECURITY deep learning English language language processing machine learning
在线阅读 下载PDF
Medical Information Breaches Occurrence with Respect to Social Media Usage, in Selected Medical Institutions in Uganda
4
作者 Joe Mutebi Margaret Kareyo +3 位作者 Umezuruike Chinecherem Hussein Muhaise Paul Akampurira Maxwell Okello 《Journal of Computer and Communications》 2022年第10期10-33,共24页
The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed... The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed online survey techniques. Altogether, 710 questionnaires (Google forms) were developed, and operationalized. The main respondents included 566 medical students, and 143 medical staff from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. Using SPSS, the main statistical analysis tools employed include frequency distribution summary, and Chi-square (x<sup>2</sup>) test. According to the frequency distribution summary, 27% to 42% of the respondents within categorical divides acknowledged occurrence of medical information breaches due to SM usage. Notably, higher levels of the breaches were reported among male students (64%), age-group 18 to 35 years (68%), and WhatsApp users (63%). On the other hand, Chi-square results showed significant levels (p p > 0.05) between medical institutions and medical information breaches. Overall, the vulnerable areas of the breaches identified would serve as important reference points in the process of rationalizing SM usage in medical institutions. Nevertheless, further studies could focus on identification of the key SM usage factors associated with medical information breaches in medical institutions in Uganda. 展开更多
关键词 SM Usage Medical Information Breaches Medical Information Safety Electronic Healthcare Information Medical Institutions
在线阅读 下载PDF
Comparative Analysis of Scheduling Algorithms Performance in a Long Term Evolution Network
5
作者 Bamidele Moses Kuboye 《Journal of Computer Science Research》 2021年第4期20-25,共6页
The advancement in cellular communications has enhanced the special attention given to the study of resource allocation schemes.This study is to enhance communications to attain efficiency and thereby offers fairness ... The advancement in cellular communications has enhanced the special attention given to the study of resource allocation schemes.This study is to enhance communications to attain efficiency and thereby offers fairness to all users in the face of congestion experienced anytime a new product is rolled out.The comparative analysis was done on the performance of Enhanced Proportional Fair,Qos-Aware Proportional Fair and Logarithmic rule scheduling algorithms in Long Term Evolution in this work.These algorithms were simulated using LTE system toolbox in MATLAB and their performances were compared using Throughput,Packet delay and Packet Loss Ratio.The results showed Qos-Aware Proportional Fair has a better performance in all the metrics used for the evaluation. 展开更多
关键词 ALGORITHMS LTE SCHEDULING NETWORK PERFORMANCE
在线阅读 下载PDF
Machine Learning: A Review 被引量:1
6
作者 Isonkobong Christopher Udousoro 《Semiconductor Science and Information Devices》 2020年第2期5-14,共10页
Due to the complexity of data,interpretation of pattern or extraction of information becomes difficult;therefore application of machine learning is used to teach machines how to handle data more efficiently.With the i... Due to the complexity of data,interpretation of pattern or extraction of information becomes difficult;therefore application of machine learning is used to teach machines how to handle data more efficiently.With the increase of datasets,various organizations now apply machine learning applications and algorithms.Many industries apply machine learning to extract relevant information for analysis purposes.Many scholars,mathematicians and programmers have carried out research and applied several machine learning approaches in order to find solution to problems.In this paper,we focus on general review of machine learning including various machine learning techniques.These techniques can be applied to different fields like image processing,data mining,predictive analysis and so on.The paper aims at reviewing machine learning techniques and algorithms.The research methodology is based on qualitative analysis where various literatures is being reviewed based on machine learning. 展开更多
关键词 Machine learning Supervised learning Unsupervised learning Reinforcement learning Semi-supervised learning Multitask learning Ensemble learning Neural Network Instance-Based
在线阅读 下载PDF
Optimized Energy Efficient Strategy for Data Reduction Between Edge Devices in Cloud-IoT
7
作者 Dibyendu Mukherjee Shivnath Ghosh +4 位作者 Souvik Pal D.Akila N.Z.Jhanjhi Mehedi Masud Mohammed A.AlZain 《Computers, Materials & Continua》 SCIE EI 2022年第7期125-140,共16页
Numerous Internet of Things(IoT)systems produce massive volumes of information that must be handled and answered in a quite short period.The growing energy usage related to the migration of data into the cloud is one ... Numerous Internet of Things(IoT)systems produce massive volumes of information that must be handled and answered in a quite short period.The growing energy usage related to the migration of data into the cloud is one of the biggest problems.Edge computation helps users unload the workload again from cloud near the source of the information that must be handled to save time,increase security,and reduce the congestion of networks.Therefore,in this paper,Optimized Energy Efficient Strategy(OEES)has been proposed for extracting,distributing,evaluating the data on the edge devices.In the initial stage of OEES,before the transmission state,the data gathered from edge devices are supported by a fast error like reduction that is regarded as the largest energy user of an IoT system.The initial stage is followed by the reconstructing and the processing state.The processed data is transmitted to the nodes through controlled deep learning techniques.The entire stage of data collection,transmission and data reduction between edge devices uses less energy.The experimental results indicate that the volume of data transferred decreases and does not impact the professional data performance and predictive accuracy.Energy consumption of 7.38 KJ and energy conservation of 55.57 kJ was found in the proposed OEES scheme.Predictive accuracy is 97.5 percent,data performance rate was 97.65 percent,and execution time is 14.49 ms. 展开更多
关键词 Energy efficient internet of things TRANSMISSION performance cloud computing edge devices
在线阅读 下载PDF
A Survey on Token Transmission Attacks,Effects,and Mitigation Strategies in IoT Devices
8
作者 Michael Juma Ayuma Shem Mbandu Angolo Philemon Nthenge Kasyoka 《Journal on Artificial Intelligence》 2025年第1期205-254,共50页
The exponential growth of Internet of Things(IoT)devices has introduced significant security challenges,particularly in securing token-based communication protocols used for authentication and authorization.This surve... The exponential growth of Internet of Things(IoT)devices has introduced significant security challenges,particularly in securing token-based communication protocols used for authentication and authorization.This survey systematically reviews the vulnerabilities in token transmission within IoT environments,focusing on various sophisticated attack vectors such as replay attacks,token hijacking,man-in-the-middle(MITM)attacks,token injection,and eavesdropping among others.These attacks exploit the inherent weaknesses of token-based mechanisms like OAuth,JSON Web Tokens(JWT),and bearer tokens,which are widely used in IoT ecosystems for managing device interactions and access control.The impact of such attacks is profound,leading to unauthorized access,data exfiltration,and control over IoT devices,posing significant threats to privacy,safety,and the operational integrity of critical IoT applications in sectors like healthcare,smart cities,and industrial automation.This paper categorizes these attack vectors,explores real-world case studies,and analyzes their effects on resource-constrained IoT devices that have limited processing power and memory,rendering them more susceptible to such exploits.Furthermore,this survey presents a comprehensive evaluation of existing mitigation techniques,including cryptographic protocols,lightweight secure transmission frameworks,secure token management practices,and network-layer defenses such as Transport Layer Security(TLS)and multi-factor authentication(MFA).The study also highlights the trade-offs between security and performance in IoT systems and identifies key gaps in current research,emphasizing the need for more scalable,energy-efficient,and robust security frameworks to address the evolving landscape of token transmission attacks in IoT devices. 展开更多
关键词 Token transmission IoT attacks IoT authentication cryptography encryption
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部