International Journal of Security and Privacy in Pervasive Computing最新文献

筛选
英文 中文
Real Impact of the Blockchain in Securing a ToIP Network 区块链对保护顶级ip网络的真正影响
International Journal of Security and Privacy in Pervasive Computing Pub Date : 2023-06-08 DOI: 10.4018/ijsppc.324165
Sekoude Jehovah-nis Pedrie Sonon, Tahirou Djara, Matine Abdoul Ousmane, Abdou-Aziz Sobabe
{"title":"Real Impact of the Blockchain in Securing a ToIP Network","authors":"Sekoude Jehovah-nis Pedrie Sonon, Tahirou Djara, Matine Abdoul Ousmane, Abdou-Aziz Sobabe","doi":"10.4018/ijsppc.324165","DOIUrl":"https://doi.org/10.4018/ijsppc.324165","url":null,"abstract":"Telephony over IP (ToIP) is a cost-saving communication technology based on voice over IP (VoIP) that enables enterprises to reduce communication fees. However, ToIP faces many security threats due to its IP-based nature. This work aims to improve ToIP security using cryptography and blockchain technology. The authors propose a secure approach to user registration, authentication, communication session establishment, and communication data storage. The proposed solution leverages blockchain technology to ensure the integrity, confidentiality, and availability of communication data. By implementing this solution, the researchers aim to enhance the security of ToIP networks and protect them from cyber threats. This approach provides a secure and reliable way to support ToIP services while preserving confidentiality and privacy.","PeriodicalId":278930,"journal":{"name":"International Journal of Security and Privacy in Pervasive Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Journal 杂志
International Journal of Security and Privacy in Pervasive Computing Pub Date : 2023-03-23 DOI: 10.4018/ijsppc.318676
Varun Kharbanda, None Seetharaman A, None Maddulety K
{"title":"Journal","authors":"Varun Kharbanda, None Seetharaman A, None Maddulety K","doi":"10.4018/ijsppc.318676","DOIUrl":"https://doi.org/10.4018/ijsppc.318676","url":null,"abstract":"Artificial intelligence (AI) has emerged as the most widely applicable field across varied industries. Being an evolving technology, it may be quite useful in sensitive areas such as cyber security where there is a dire need for implementation of AI technologies, such as expert systems, neural networks, intelligent agents, and artificial immune systems. The primary reason for AI fitment to cyber security area is its ability to detect anomalies proactively and predictively in the network, thereby working towards securing the network before the damage related to loss of data and/or reputation is done. There are different types of AI technologies as mentioned above that could be applied in cyber security in its varied forms. In this paper, the emphasis is on specific AI technologies that can bring unique benefits to the cyber security field with its unique applicability to different scenarios. The outcome of this study shows that AI technologies such as expert systems, neural networks, intelligent agents, and artificial immune systems are transforming the landscape for managing cyber threats.","PeriodicalId":278930,"journal":{"name":"International Journal of Security and Privacy in Pervasive Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136166929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Do ChatGPT and Other AI Chatbots Pose a Cybersecurity Risk? ChatGPT和其他人工智能聊天机器人会带来网络安全风险吗?
International Journal of Security and Privacy in Pervasive Computing Pub Date : 2023-03-22 DOI: 10.4018/ijsppc.320225
Glorin Sebastian
{"title":"Do ChatGPT and Other AI Chatbots Pose a Cybersecurity Risk?","authors":"Glorin Sebastian","doi":"10.4018/ijsppc.320225","DOIUrl":"https://doi.org/10.4018/ijsppc.320225","url":null,"abstract":"The rise of artificial intelligence (AI) has opened up new frontiers in various fields, including natural language processing. One of the most significant advancements in this area is the development of conversational agents (i.e., chatbots), which are computer programs designed to interact with humans through messaging interfaces. The emergence of large language models, such as ChatGPT, has enabled the creation of highly sophisticated chatbots that can mimic human conversations with impressive accuracy. However, the use of these chatbots also poses significant cyber risks that must be addressed. This research paper seeks to investigate the cyber risks associated with the use of ChatGPT and other similar AI-based chatbots, including potential vulnerabilities that could be exploited by malicious actors. As part of this research, a survey was conducted to explore the cybersecurity risks associated with AI-based chatbots like ChatGPT. Further, the paper also suggests mitigation methods that can be used to mitigate these cyber risks and vulnerabilities.","PeriodicalId":278930,"journal":{"name":"International Journal of Security and Privacy in Pervasive Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136174732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Meaning of Privacy in the Digital Era 数字时代隐私的意义
International Journal of Security and Privacy in Pervasive Computing Pub Date : 2023-03-03 DOI: 10.4018/ijsppc.318675
J. Adams, Hala Almahmoud
{"title":"The Meaning of Privacy in the Digital Era","authors":"J. Adams, Hala Almahmoud","doi":"10.4018/ijsppc.318675","DOIUrl":"https://doi.org/10.4018/ijsppc.318675","url":null,"abstract":"The key research objective of the current study is to answer the following research question: Why is ‘privacy' a contested concept that is hard to define? In doing so, the study will raise awareness of the contemporary meaning of ‘privacy' in relation to cyber activities and to draw attention to the need for developing the right to cyber privacy and its legal protection. Hence, the current study has embarked on analysing the meaning of privacy in general, and the meaning of cyber or online privacy in particular. As a result, privacy has been found to be a perennially contestable concept, and this is exacerbated by the ever more rapidly developing digital world and also by the diverse perceptions which vary across societies, cultures, and generations. This has created a big challenge for regulators and legislators to define a specific privacy right that can be accorded with a legal protection against violations across national and international jurisdictions. However, the right to privacy has been found to be vague and open to multiple, competing interpretations.","PeriodicalId":278930,"journal":{"name":"International Journal of Security and Privacy in Pervasive Computing","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121516383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A bio- medical Question Answering system for the Malayalam language using word embedding and Bidirectional Encoder Representation from Transformers. 一种马拉雅拉姆语的生物医学问答系统,使用《变形金刚》中的词嵌入和双向编码器表示。
International Journal of Security and Privacy in Pervasive Computing Pub Date : 2022-01-01 DOI: 10.4018/ijsppc.302009
{"title":"A bio- medical Question Answering system for the Malayalam language using word embedding and Bidirectional Encoder Representation from Transformers.","authors":"","doi":"10.4018/ijsppc.302009","DOIUrl":"https://doi.org/10.4018/ijsppc.302009","url":null,"abstract":"Conversational search is the dominant intent of Question Answering, which is achieved through different NLP techniques, Deep Learning models. The advent of Transformer models has been a breakthrough in Natural Language Processing applications, which has attained a benchmark on state of NLP tasks such as question answering. Here we propose a semantic Malayalam Question Answering system that automatically answers the queries related to health issues. The Biomedical Question-Answering, especially in the Malayalam language, is a tedious and challenging task. The proposed model uses a neural network-based Bidirectional Encoder Representation from Transformers (BERT), to implement the question answering system. In this study, we investigate how to train and fine-tune a BERT model for Question-Answering. The system has been tested with our own annotated Malayalam SQUAD form health dataset. In comparing the result with our previous works - Word embedding and RNN based model, identified we find that our BERT model is more accurate than the previous models and achieves an F1 score of 86%.","PeriodicalId":278930,"journal":{"name":"International Journal of Security and Privacy in Pervasive Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132872061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信