722 research outputs found

    OAS: An Advanced Undergraduate Office Automated System for Automate Bank Work Routing

    Get PDF
    Office automation systems (OAS) have steadily gained popularity as a result of the information technology industry's fast expansion. The promise of office automation, which is meant to increase productivity in the office setting, has caused organizations in both the public and commercial sectors to grow concerned. This issue becomes quite important due to the rising costs of new and enhanced office automation technologies. As a result, industries like banks have improved their front-end client operations using digital solutions. However, a large number of bank processors still depend on personnel and paper. This level of human processing is expensive, sluggish, and may provide results that are highly inconsistent, have significant mistake rates, and pose security risks. Through this research work, our aim is to consider existing significant opportunities in backoffice automation level increase and develop a pilot OAS to work smart with a higher level of efficiency in the office environment. The proposed solution is enriched with image processing methods to authenticate employees to ensure the security of the banking environment by enabling access control and providing a well-accurate employee attendance handling system through web and mobile app facilities which are enabled by GPS and API call technologies. To maintain on-time accurate customer support service, our study has proposed a smart customer handling facility with the help of an AI chatbot and some IoT device material

    A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions

    Full text link
    One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In addition, some of these surveys focused on the Transmission Control Protocol/Internet Protocol (TCP/IP) model, which does not differentiate between the application, session, and presentation and the data link and physical layers of the Open System Interconnection (OSI) model. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions

    Cyber Threat Intelligence based Holistic Risk Quantification and Management

    Get PDF

    Deployment of DeepTech AI Models in Engineering Solutions

    Get PDF
    Ponencia presentada en ICRAMAE-2k21, International Conference on Recent Advances in Mechanical and Automation Engineering, Vivekananda Global University, Jaipur, India, 29-30th November 2021[EN]Industrial Engineering is a branch of engineering that focuses on the design and operation of industrial processes. It involves the application of science to the construction of production systems. This field has undergone significant advancements over the last decades. In the last centuries, the emergence of different technologies has led to breakthroughs in engineering, making it possible to automate processes in industries. Steam, electricity, the internet, and now Artificial Intelligence technologies have all brought with them greater levels of automation to machinery, gradually decreasing human involvement in processes such as procurement, raw material handling, manufacturing and quality control

    Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation

    Get PDF
    The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics
    • …
    corecore