Procedia Computer Science最新文献

筛选
英文 中文
Neoteric Threat Intelligence Ensuring Digital Sovereignty and Trust through ML-Infused Proactive Defense Analytics for NEXT-G and Beyond Ecosystems
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.062
Sudhakar Kumar , Sunil K. Singh , Rakesh Kumar , Chandra Kumari Subba , Kwok Tai Chui , Brij B. Gupta
{"title":"Neoteric Threat Intelligence Ensuring Digital Sovereignty and Trust through ML-Infused Proactive Defense Analytics for NEXT-G and Beyond Ecosystems","authors":"Sudhakar Kumar ,&nbsp;Sunil K. Singh ,&nbsp;Rakesh Kumar ,&nbsp;Chandra Kumari Subba ,&nbsp;Kwok Tai Chui ,&nbsp;Brij B. Gupta","doi":"10.1016/j.procs.2025.02.062","DOIUrl":"10.1016/j.procs.2025.02.062","url":null,"abstract":"<div><div>In the domain of Cyber-Physical Systems (CPS) and the Internet of Things (IoT), this research presents a novel approach to Neoteric Threat Intelligence ensuring Digital Sovereignty and Trust through ML-Infused Proactive Defense Analytics for NEXT-G and Beyond Ecosystems. As Sixth Generation and Beyond (6G and B) wireless networks undergo rapid evolution, our framework is designed to proactively anticipate and counter security incidents by utilizing advanced machine learning algorithms. This approach effectively addresses the shortcomings of conventional models, ensuring that digital assets and communications remain secure, trustworthy, and under rightful control. The study delves into the theoretical integration of this paradigm within the NextG network architecture, reinforcing digital sovereignty through a dynamic and adaptable defense mechanism. In-depth technical examinations include advanced machine learning algorithms, adaptive defenses, and scalability considerations. By critically analyzing and comparing existing security approaches, this study significantly advances technical knowledge and practical applications for wireless network security, supporting defenses against the evolving and complex threats characteristic of the 6G and Beyond era.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"254 ","pages":"Pages 39-47"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143550981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sovereignty-Aware Intrusion Detection on Streaming Data: Automatic Machine Learning Pipeline and Semantic Reasoning
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.066
Ayan Chatterjee , Sundar Gopalakrishnan , Ayan Mondal
{"title":"Sovereignty-Aware Intrusion Detection on Streaming Data: Automatic Machine Learning Pipeline and Semantic Reasoning","authors":"Ayan Chatterjee ,&nbsp;Sundar Gopalakrishnan ,&nbsp;Ayan Mondal","doi":"10.1016/j.procs.2025.02.066","DOIUrl":"10.1016/j.procs.2025.02.066","url":null,"abstract":"<div><div>Intrusion Detection Systems (IDS) are critical in safeguarding network infrastructures against malicious attacks. Traditional IDSs often struggle with knowledge representation, real-time detection, and accuracy, especially when dealing with high-throughput data. This paper proposes a novel IDS framework that leverages machine learning models, streaming data, and semantic knowledge representation to enhance intrusion detection accuracy and scalability. Additionally, the study incorporates the concept of Digital Sovereignty, ensuring that data control, security, and privacy are maintained according to national and regional regulations. The proposed system integrates Apache Kafka for real-time data processing, an automatic machine learning pipeline (e.g., Tree-based Pipeline Optimization Tool (TPOT)) for classifying network traffic, and OWL-based semantic reasoning for advanced threat detection. The proposed system, evaluated on NSL-KDD and CIC-IDS-2017 datasets, demonstrated qualitative outcomes such as local compliance, reduced data storage needs due to real-time processing, and improved adaptability to local data laws. Experimental results reveal significant improvements in detection accuracy, processing efficiency, and Sovereignty alignment.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"254 ","pages":"Pages 78-87"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143551018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ChatGPT in Education: A Review of Ethical Challenges and Approaches to Enhancing Transparency and Privacy
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.077
Ibomoiye Domor Mienye , Theo G. Swart
{"title":"ChatGPT in Education: A Review of Ethical Challenges and Approaches to Enhancing Transparency and Privacy","authors":"Ibomoiye Domor Mienye ,&nbsp;Theo G. Swart","doi":"10.1016/j.procs.2025.02.077","DOIUrl":"10.1016/j.procs.2025.02.077","url":null,"abstract":"<div><div>The integration of ChatGPT and large language models (LLMs) into education has created new possibilities for personalized learning, tutoring, and automation of administrative tasks. However, these advancements also present ethical challenges. This paper critically examines the ethical implications of deploying ChatGPT in educational settings, with a focus on data privacy, the opaque nature of AI decision-making, and the risks of biased outputs. To address these issues, we outline actionable approaches, including Explainable AI (XAI) techniques and privacy-preserving strategies, aimed at enabling transparency and protecting student data. We also outline frameworks that support human oversight and governance to maintain trust and accountability in Al-driven educational tools.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"254 ","pages":"Pages 181-190"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143551028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Sovereignty through Africa-Centric Emotional Intelligence: A Proof of Concept for AI-Enhanced Mental Health Support
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.086
Sontaga G. Forane , Absalom E. Ezugwu , Kevin Igwe
{"title":"Digital Sovereignty through Africa-Centric Emotional Intelligence: A Proof of Concept for AI-Enhanced Mental Health Support","authors":"Sontaga G. Forane ,&nbsp;Absalom E. Ezugwu ,&nbsp;Kevin Igwe","doi":"10.1016/j.procs.2025.02.086","DOIUrl":"10.1016/j.procs.2025.02.086","url":null,"abstract":"<div><div>Digital sovereignty is vital for enabling communities to control their technological ecosystems, particularly in areas like mental health, where cultural relevance and data autonomy are paramount. This study examines the integration of Africa-centric emotional intelligence principles into AI-driven mental health support systems, while at the same time proposing a culturally adaptive framework with a proof of concept that emphasizes both technological autonomy and cultural authenticity. Grounded in values such as empathy, communal well-being, resilience, and Ubuntu, the conceptualized approach aligns mental health interventions with the lived experience of African communities. The framework incorporates conversational agents and personalized interventions, alongside a prototype system capable of detecting and classifying mental health conditions, such as depression, anxiety, and stress. The culturally aligned design enhances user trust, engagement, and perceived usefulness, By emphasizing local data control and leveraging Indigenous systems, this work promotes digital sovereignty and addresses privacy concerns. Preliminary testing of the prototype demonstrates the feasibility of culturally attuned AI solutions, showing improved user engagement and trust. This paper emphasizes the need for mental health interventions that respect cultural identity while promoting digital autonomy. More so, it advocates for AI systems personalized to regional contexts and calls for mental health solutions that uphold cultural identity while advancing digital self-governance.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"254 ","pages":"Pages 269-278"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143551080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring Digital Sovereignty in Cross-chain EHR Sharing: A Relay-as-a-Service Approach for Secure Healthcare Interoperability
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.063
Dharavath Ramesh , Thakur Santosh , Munesh Chandra Trivedi , Chi Hieu Le
{"title":"Ensuring Digital Sovereignty in Cross-chain EHR Sharing: A Relay-as-a-Service Approach for Secure Healthcare Interoperability","authors":"Dharavath Ramesh ,&nbsp;Thakur Santosh ,&nbsp;Munesh Chandra Trivedi ,&nbsp;Chi Hieu Le","doi":"10.1016/j.procs.2025.02.063","DOIUrl":"10.1016/j.procs.2025.02.063","url":null,"abstract":"<div><div>Electronic Health Records (EHRs) stored in cloud environments often face privacy challenges in healthcare data management due to the divide between patient ownership and institutional control. Blockchain technology offers a promising solution with its features of immutability and traceability. However, existing blockchain-based approaches for EHR privacy preservation are limited to single institutions and fail to address the critical need for cross-chain compatibility and digital sovereignty. To bridge this gap, we propose two novel strategies: Polkadot-based Cross-chain for EHR-preserving Blockchain (PCEB) and Relay-as-a-Service-based Cross-chain for EHR-preserving Blockchain (RaSCEB). PCEB utilizes Polkadot's relay communication to securely share EHR data across multiple healthcare networks while preserving patient privacy and ensuring digital sovereignty. RaSCEB introduces Relay-as-a-Service (RaaS) to enable seamless EHR sharing across blockchain ecosystems, empowering patients with control over their data while maintaining regulatory compliance and sovereignty over their digital health records. Both approaches are validated through comprehensive security analysis and performance evaluations. We also present an interoperability framework tailored for permissioned blockchain networks, emphasizing trust derived from consensus mechanisms. Our work addresses the urgent need for cross-chain compatibility in EHR privacy preservation and advances interoperability solutions while safeguarding digital sovereignty in healthcare and beyond.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"254 ","pages":"Pages 48-57"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143551085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conventional and Zero Trust Security Measures for Precision Agriculture Devices: the mySense’s VineInspector Case-study
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.118
Luís Carvalho , Telmo Adão , Raul Morais , António Rio Costa , Emanuel Peres
{"title":"Conventional and Zero Trust Security Measures for Precision Agriculture Devices: the mySense’s VineInspector Case-study","authors":"Luís Carvalho ,&nbsp;Telmo Adão ,&nbsp;Raul Morais ,&nbsp;António Rio Costa ,&nbsp;Emanuel Peres","doi":"10.1016/j.procs.2025.02.118","DOIUrl":"10.1016/j.procs.2025.02.118","url":null,"abstract":"<div><div>Precision Agriculture (PA) systems, crucial for modern farming, heavily rely on data gathered from various sensors often connected through an Internet of Things (IoT)-based environment, wherein cybersecurity challenges must not be neglected. To address such challenges, this paper explores conventional security approaches and Zero Trust (ZT) principles oriented to PA. To that end, a practical case-study focusing a precision viticulture device known as VineInspector is assessed in terms of susceptibilities, encompassing unauthorized physical access, manipulation of sensor readings, and tampering of data communication. As a result of that assessment, a set of recommendations are provided to ensure integrity, confidentiality, and availability of agricultural data, with applicability to PA devices operating in conditions similar to the one considered for the referred case-study.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"256 ","pages":"Pages 246-254"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143592577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research Insights on the Ethical Aspects of AI-Based Smart Learning Environments: Review on the Confluence of Academic Enterprises and AI
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.122
Sini Raj Pulari , Shomona Gracia Jacob
{"title":"Research Insights on the Ethical Aspects of AI-Based Smart Learning Environments: Review on the Confluence of Academic Enterprises and AI","authors":"Sini Raj Pulari ,&nbsp;Shomona Gracia Jacob","doi":"10.1016/j.procs.2025.02.122","DOIUrl":"10.1016/j.procs.2025.02.122","url":null,"abstract":"<div><div>Dramatic progress in the use of AI for the design of smart learning systems has undoubtedly enhanced the professional competence of students across the globe. However, the sudden access to unlimited autonomy has posed unprecedented risks to moral and ethical practices in educational standards that far outweigh the rewards. In this research, the authors attempt to present a succinct review on the ethical implications of employing artificial intelligence in classroom education both from the educator and the student’s perspective. Summarizing the loopholes in establishing strong ethical practices by virtue of AI leverage, especially in the realm of education is of utmost importance. The findings of this study revealed two main spheres of educational transformation that need to be addressed in smart academic enterprises: (a) automated review generation based on student and evaluator scores (b)infallible system to ensure adherence to ethical practices during assessments.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"256 ","pages":"Pages 284-291"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143592581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
K-operator as a predictor for Alzheimer-Perusini’s disease
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.173
Maria Mannone , Norbert Marwan , Peppino Fazio , Patrizia Ribino
{"title":"K-operator as a predictor for Alzheimer-Perusini’s disease","authors":"Maria Mannone ,&nbsp;Norbert Marwan ,&nbsp;Peppino Fazio ,&nbsp;Patrizia Ribino","doi":"10.1016/j.procs.2025.02.173","DOIUrl":"10.1016/j.procs.2025.02.173","url":null,"abstract":"<div><div>Progressive memory loss occurring in age-related neurological diseases contributes to the disgregation of the individual, with serious personal and social consequences. We model the brain network damage provoked by a neurological disease through a physics-inspired mathematical operator, <em>K</em>. Acting on a diseased brain, <em>K</em> provides the disease time evolution. Focusing on Alzheimer-Perusini’s disease (AD), we approximate the <em>K</em>-operator considering selected patients of the ADNI 2 dataset. We also propose <em>K</em> as a predictor for the disease progress over time and give its preliminary evaluation in the AD progression from the cognitive normal (CN) stage to AD through intermediate mild cognitive impairment (MCI) stages.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"256 ","pages":"Pages 731-738"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143593269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network Ensemble for Detecting Parasite Eggs in Microscopic Images
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.174
Matheus L.L. Bessa , Geraldo Braz Junior , João Dallyson Souza de Almeida
{"title":"Neural Network Ensemble for Detecting Parasite Eggs in Microscopic Images","authors":"Matheus L.L. Bessa ,&nbsp;Geraldo Braz Junior ,&nbsp;João Dallyson Souza de Almeida","doi":"10.1016/j.procs.2025.02.174","DOIUrl":"10.1016/j.procs.2025.02.174","url":null,"abstract":"<div><div>Intestinal parasite infections are a global health problem. In 2022, the WHO estimates that up to 1.2 billion people will be infected with Ascaris lumbricoides. Diagnosis is conducted by analyzing faecall samples under a microscope. However, this process is laborious and prone to error. Considering this, this study proposes a methodology to automate the detection of parasite eggs in microscope images. This methodology applies multiple object detectors in an ensemble and submits a model to reduce false negatives in the public dataset Chula-ParasiteEgg-11, with 11,000 images and 11 classes of parasites. Using this approach, it was possible to reduce the false negative rate and improve the f1 score up to 0.94. The results suggest that the proposed model leads to a reduction of false negatives and an improvement in recall.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"256 ","pages":"Pages 739-746"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143593270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Many to One: A Case Study of Cooperative Enterprise Systems in B2B Digital Platform Creation
Procedia Computer Science Pub Date : 2025-01-01 DOI: 10.1016/j.procs.2025.02.089
Jaakko Vuolasto, Kari Smolander
{"title":"From Many to One: A Case Study of Cooperative Enterprise Systems in B2B Digital Platform Creation","authors":"Jaakko Vuolasto,&nbsp;Kari Smolander","doi":"10.1016/j.procs.2025.02.089","DOIUrl":"10.1016/j.procs.2025.02.089","url":null,"abstract":"<div><div>Enterprise systems are complex solutions to diverse needs of companies, but their extent does not typically span firm boundaries. Instead, there are different ways to handle inter-organizational IT requirements, including digital platforms that have established their position in the recent years. Despite the significance of enterprise systems for the companies and the growing interest in business-to-business digital platforms, the relationship of the two remains largely unexplored. Our qualitative case study utilizing grounded theory analysis portrays the trajectory from multiple enterprise systems into a new B2B platform. We show how shared problem space powers an intentional and clearly defined change, leading to a co-existence of the enterprise systems and the digital platform, and an alignment of interests between the stakeholders. This relationship of the platform and enterprise systems is more balanced than the one-way dependency presented in the literature, where the complementing systems are subject to the platform core.</div></div>","PeriodicalId":20465,"journal":{"name":"Procedia Computer Science","volume":"256 ","pages":"Pages 3-11"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143592740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信