Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Mais filtros











Base de dados
Intervalo de ano de publicação
1.
Heliyon ; 9(11): e22269, 2023 Nov.
Artigo em Inglês | MEDLINE | ID: mdl-38058627

RESUMO

The Darkweb, part of the deep web, can be accessed only through specialized computer software and used for illegal activities such as cybercrime, drug trafficking, and exploitation. Technological advancements like Tor, bitcoin, and cryptocurrencies allow criminals to carry out these activities anonymously, leading to increased use of the Darkweb. At the same time, computers have become an integral part of our daily lives, shaping our behavior, and influencing how we interact with each other and the world. This work carries out the bibliometric study on the research conducted on Darkweb over the last decade. The findings illustrate that most research on Darkweb can be clustered into four areas based on keyword co-occurrence analysis: (i) network security, malware, and cyber-attacks, (ii) cybercrime, data privacy, and cryptography, (iii) machine learning, social media, and artificial intelligence, and (iv) drug trafficking, cryptomarket. National Science Foundation from the United States is the top funder. Darkweb activities interfere with the Sustainable Development Goals (SDG) laid forth by the United Nations to promote peace and sustainability for current and future generations. SDG 16 (Peace, Justice, and Strong Institutions) has the highest number of publications and citations but has an inverse relationship with Darkweb, as the latter undermines the former. This study highlights the need for further research in bitcoin, blockchain, IoT, NLP, cryptocurrencies, phishing and cybercrime, botnets and malware, digital forensics, and electronic crime countermeasures about the Darkweb. The study further elucidates the multi-dimensional nature of the Darkweb, emphasizing the intricate relationship between technology, psychology, and geopolitics. This comprehensive understanding serves as a cornerstone for evolving effective countermeasures and calls for an interdisciplinary research approach. The study also delves into the psychological motivations driving individuals towards illegal activities on the Darkweb, highlighting the urgency for targeted interventions to promote pro-social online behavior.

2.
SN Comput Sci ; 2(4): 279, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-34027432

RESUMO

Anomaly detection and explanation in big volumes of real-world medical data, such as those pertaining to COVID-19, pose some challenges. First, we are dealing with time-series data. Typical time-series data describe behavior of a single object over time. In medical data, we are dealing with time-series data belonging to multiple entities. Thus, there may be multiple subsets of records such that records in each subset, which belong to a single entity are temporally dependent, but the records in different subsets are unrelated. Moreover, the records in a subset contain different types of attributes, some of which must be grouped in a particular manner to make the analysis meaningful. Anomaly detection techniques need to be customized for time-series data belonging to multiple entities. Second, anomaly detection techniques fail to explain the cause of outliers to the experts. This is critical for new diseases and pandemics where current knowledge is insufficient. We propose to address these issues by extending our existing work called IDEAL, which is an LSTM-autoencoder based approach for data quality testing of sequential records, and provides explanations of constraint violations in a manner that is understandable to end-users. The extension (1) uses a novel two-level reshaping technique that splits COVID-19 data sets into multiple temporally-dependent subsequences and (2) adds a data visualization plot to further explain the anomalies and evaluate the level of abnormality of subsequences detected by IDEAL. We performed two systematic evaluation studies for our anomalous subsequence detection. One study uses aggregate data, including the number of cases, deaths, recovered, and percentage of hospitalization rate, collected from a COVID tracking project, New York Times, and Johns Hopkins for the same time period. The other study uses COVID-19 patient medical records obtained from Anschutz Medical Center health data warehouse. The results are promising and indicate that our techniques can be used to detect anomalies in large volumes of real-world unlabeled data whose accuracy or validity is unknown.

3.
ACS Synth Biol ; 9(10): 2656-2664, 2020 10 16.
Artigo em Inglês | MEDLINE | ID: mdl-32916048

RESUMO

The field of synthetic biology relies on an ever-growing supply chain of synthetic genetic material. Technologies to secure the exchange of this material are still in their infancy. Solutions proposed thus far have focused on watermarks, a dated security approach that can be used to claim authorship, but is subject to counterfeit, and does not provide any information about the integrity of the genetic material itself. In this manuscript, we describe how data encryption and digital signature algorithms can be used to ensure the integrity and authenticity of synthetic genetic constructs. Using a pilot software that generates digital signatures and other encrypted data for plasmids, we demonstrate that we can predictably extract information about the author, the identity, the integrity of plasmid sequences, and even annotations from sequencing data alone without a reference sequence, all without compromising the function of the plasmids. Encoding a digital signature into a DNA molecule provides an avenue for genetic designers to claim authorship of DNA molecules. This technology could help compliance with material transfer agreements and other licensing agreements.


Assuntos
Algoritmos , Segurança Computacional , Software , Sequência de Bases , DNA/genética , Escherichia coli/genética , Estudos de Viabilidade , Engenharia Genética/métodos , Humanos , Mutação , Projetos Piloto , Plasmídeos/genética , Polimorfismo de Nucleotídeo Único , Biologia Sintética/métodos
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA